Analysis

  • max time kernel
    199s
  • max time network
    307s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-10-2023 05:09

General

  • Target

    e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213.exe

  • Size

    4.0MB

  • MD5

    7ed069479280add451568981ee74e4fb

  • SHA1

    c41d0182dff37b0127cec82478ac0089b4648d9b

  • SHA256

    e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213

  • SHA512

    cd364f3e8d9048d083567b65747a2a82c9ebffe75fac3bb348bca3a39c167970d1692e26ab5cc59a955655b0994f20092407639871852663cd90cb7d03553d84

  • SSDEEP

    49152:DePIG3Ur7H2s6PTRhiQzF2ekzNztt0CBVzTt+N/5Njc0hhnVTJfbyNvRAn1Iixus:+ArzWC7Ws0gwWy

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://193.42.32.29/9bDc8sQ/index.php

Attributes
  • install_dir

    1ff8bec27e

  • install_file

    nhdues.exe

  • strings_key

    2efe1b48925e9abf268903d42284c46b

rc4.plain

Extracted

Family

vidar

Version

6.1

Botnet

55d1d90f582be35927dbf245a6a59f6e

C2

https://steamcommunity.com/profiles/76561199563297648

https://t.me/twowheelfun

Attributes
  • profile_id_v2

    55d1d90f582be35927dbf245a6a59f6e

  • user_agent

    Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

purecrypter

C2

http://104.194.128.170/svp/Hfxbflp.mp3

http://104.194.128.170/svp/Enwpk.vdf

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 21 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • PrivateLoader 1 IoCs

    PrivateLoader.

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 15 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 11 IoCs
  • Executes dropped EXE 36 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 44 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3196
    • C:\Users\Admin\AppData\Local\Temp\e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213.exe
      "C:\Users\Admin\AppData\Local\Temp\e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:4824
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • DcRat
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\Pictures\2c66QpzrBNaVk8Cvfeka834d.exe
            "C:\Users\Admin\Pictures\2c66QpzrBNaVk8Cvfeka834d.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3672
            • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
              "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:192
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F
                6⤵
                • DcRat
                • Creates scheduled task(s)
                PID:1664
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "Admin:N"&&CACLS "nhdues.exe" /P "Admin:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "Admin:N"&&CACLS "..\1ff8bec27e" /P "Admin:R" /E&&Exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4152
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:4308
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "nhdues.exe" /P "Admin:N"
                    7⤵
                      PID:4040
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "nhdues.exe" /P "Admin:R" /E
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:996
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\1ff8bec27e" /P "Admin:R" /E
                      7⤵
                        PID:1524
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\1ff8bec27e" /P "Admin:N"
                        7⤵
                          PID:2204
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          7⤵
                            PID:428
                    • C:\Users\Admin\Pictures\1M7nCvDh3PNQLFPb4UD3ymKE.exe
                      "C:\Users\Admin\Pictures\1M7nCvDh3PNQLFPb4UD3ymKE.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:4300
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd /c lophime.bat
                        5⤵
                        • Checks computer location settings
                        PID:1668
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1untilmathematicsproie1.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1untilmathematicsproie1.exe
                        5⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        PID:4924
                    • C:\Users\Admin\Pictures\Ck6JaYbPjE69sS7HEuansNao.exe
                      "C:\Users\Admin\Pictures\Ck6JaYbPjE69sS7HEuansNao.exe"
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in Drivers directory
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4464
                    • C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe
                      "C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe"
                      4⤵
                        PID:996
                        • C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe
                          "C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe"
                          5⤵
                          • Executes dropped EXE
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:5064
                      • C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe
                        "C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:4736
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4080
                        • C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe
                          "C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe"
                          5⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          PID:5588
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                            • Modifies data under HKEY_USERS
                            PID:4428
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                            6⤵
                              PID:5524
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                7⤵
                                • Modifies Windows Firewall
                                PID:5880
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                                PID:3024
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                6⤵
                                  PID:5764
                            • C:\Users\Admin\Pictures\qS1lvzXBmbQbFaXBvGL1ej9Q.exe
                              "C:\Users\Admin\Pictures\qS1lvzXBmbQbFaXBvGL1ej9Q.exe"
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Checks processor information in registry
                              PID:2224
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 1760
                                5⤵
                                • Program crash
                                PID:1900
                            • C:\Users\Admin\Pictures\jZHNzXhQ71sMIOcSyYzMKZpq.exe
                              "C:\Users\Admin\Pictures\jZHNzXhQ71sMIOcSyYzMKZpq.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4732
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 2264
                                5⤵
                                • Program crash
                                PID:216
                            • C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe
                              "C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:912
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                5⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4612
                              • C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe
                                "C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe"
                                5⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                PID:1496
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  6⤵
                                  • Modifies data under HKEY_USERS
                                  PID:4176
                                • C:\Windows\System32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  6⤵
                                    PID:5520
                                    • C:\Windows\system32\netsh.exe
                                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                      7⤵
                                      • Modifies Windows Firewall
                                      PID:2604
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    6⤵
                                      PID:5732
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      6⤵
                                        PID:6084
                                      • C:\Windows\rss\csrss.exe
                                        C:\Windows\rss\csrss.exe
                                        6⤵
                                          PID:1944
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            7⤵
                                              PID:2992
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                              7⤵
                                              • DcRat
                                              • Creates scheduled task(s)
                                              PID:5944
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /delete /tn ScheduledUpdate /f
                                              7⤵
                                                PID:3488
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                7⤵
                                                  PID:5300
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  7⤵
                                                    PID:2112
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                    7⤵
                                                      PID:5668
                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                      7⤵
                                                      • DcRat
                                                      • Creates scheduled task(s)
                                                      PID:5960
                                                    • C:\Windows\windefender.exe
                                                      "C:\Windows\windefender.exe"
                                                      7⤵
                                                        PID:4564
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                          8⤵
                                                            PID:3016
                                                            • C:\Windows\SysWOW64\sc.exe
                                                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                              9⤵
                                                              • Launches sc.exe
                                                              PID:5176
                                                  • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe
                                                    "C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe" --silent --allusers=0
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Enumerates connected drives
                                                    • Modifies system certificate store
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2328
                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\G3ImObVE2d9kbY90Hwgd2MeI.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\G3ImObVE2d9kbY90Hwgd2MeI.exe" --version
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:4108
                                                    • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe
                                                      C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.34 --initial-client-data=0x2c0,0x2c4,0x2c8,0x29c,0x2cc,0x6ea58538,0x6ea58548,0x6ea58554
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:5028
                                                    • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe
                                                      "C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2328 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231020052855" --session-guid=6a5e433e-eabf-4175-94af-54061db93f87 --server-tracking-blob=NzcxZDk0OTYwMjU2NDFiZjNiMGM1N2MwZmZjMjhjNjk4YTA4OGNkYWE4MTdhNjE2N2E3OWM4ODg0ZjJhM2ExYjp7ImNvdW50cnkiOiJVUyIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTY5Nzc3OTcyNC41NTg1IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI0MzljYWZmYy04YzE4LTRhZTAtYWQ0My1jMDQwYTk2MDM3NjIifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=B004000000000000
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Enumerates connected drives
                                                      PID:2596
                                                      • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe
                                                        C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.34 --initial-client-data=0x2b8,0x2bc,0x2cc,0x294,0x2d0,0x6d838538,0x6d838548,0x6d838554
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:1608
                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:2372
                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\assistant_installer.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\assistant_installer.exe" --version
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:360
                                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\assistant_installer.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x1561588,0x1561598,0x15615a4
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:5400
                                                  • C:\Users\Admin\Pictures\0NXT9gOYBwoqIoxeAhF3CFKt.exe
                                                    "C:\Users\Admin\Pictures\0NXT9gOYBwoqIoxeAhF3CFKt.exe"
                                                    4⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1316
                                                  • C:\Users\Admin\Pictures\mMHfQyCad8nYTIadB4X4arA4.exe
                                                    "C:\Users\Admin\Pictures\mMHfQyCad8nYTIadB4X4arA4.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:4748
                                                    • C:\Users\Admin\AppData\Local\Temp\7zS2507.tmp\Install.exe
                                                      .\Install.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:1832
                                                      • C:\Users\Admin\AppData\Local\Temp\7zS584C.tmp\Install.exe
                                                        .\Install.exe /dcCcdidRiisJ "385118" /S
                                                        6⤵
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Enumerates system info in registry
                                                        PID:5776
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                          7⤵
                                                            PID:5640
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                              8⤵
                                                                PID:5156
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                  9⤵
                                                                    PID:1944
                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                    9⤵
                                                                      PID:1012
                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                  7⤵
                                                                    PID:5872
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                      8⤵
                                                                        PID:4828
                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                          9⤵
                                                                            PID:96
                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                            9⤵
                                                                              PID:4428
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "gkuixUCmf" /SC once /ST 00:46:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                          7⤵
                                                                          • DcRat
                                                                          • Creates scheduled task(s)
                                                                          PID:6060
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /run /I /tn "gkuixUCmf"
                                                                          7⤵
                                                                            PID:5984
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "gkuixUCmf"
                                                                            7⤵
                                                                              PID:676
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /CREATE /TN "bwpFiyeZPJPVdaMxTt" /SC once /ST 05:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\pvJuKNH.exe\" 3Y /eGsite_idbTT 385118 /S" /V1 /F
                                                                              7⤵
                                                                              • DcRat
                                                                              • Drops file in Windows directory
                                                                              • Creates scheduled task(s)
                                                                              PID:2804
                                                                              • C:\Windows\System32\Conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                8⤵
                                                                                  PID:5320
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /run /I /tn "bwpFiyeZPJPVdaMxTt"
                                                                                7⤵
                                                                                  PID:1388
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                        2⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4040
                                                                      • C:\Windows\System32\cmd.exe
                                                                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                        2⤵
                                                                          PID:5284
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop UsoSvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5316
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop WaaSMedicSvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5328
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop wuauserv
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5340
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop bits
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5356
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop dosvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5372
                                                                        • C:\Windows\System32\cmd.exe
                                                                          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                          2⤵
                                                                            PID:5384
                                                                            • C:\Windows\System32\powercfg.exe
                                                                              powercfg /x -hibernate-timeout-ac 0
                                                                              3⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5440
                                                                            • C:\Windows\System32\powercfg.exe
                                                                              powercfg /x -hibernate-timeout-dc 0
                                                                              3⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5544
                                                                            • C:\Windows\System32\powercfg.exe
                                                                              powercfg /x -standby-timeout-ac 0
                                                                              3⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5560
                                                                            • C:\Windows\System32\powercfg.exe
                                                                              powercfg /x -standby-timeout-dc 0
                                                                              3⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5572
                                                                          • C:\Windows\System32\schtasks.exe
                                                                            C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
                                                                            2⤵
                                                                              PID:5424
                                                                            • C:\Windows\System32\schtasks.exe
                                                                              C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"
                                                                              2⤵
                                                                              • DcRat
                                                                              • Creates scheduled task(s)
                                                                              PID:5676
                                                                            • C:\Windows\System32\schtasks.exe
                                                                              C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                              2⤵
                                                                                PID:5944
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                2⤵
                                                                                • Drops file in System32 directory
                                                                                • Modifies data under HKEY_USERS
                                                                                PID:5300
                                                                              • C:\Windows\System32\cmd.exe
                                                                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                2⤵
                                                                                  PID:5332
                                                                                  • C:\Windows\System32\sc.exe
                                                                                    sc stop UsoSvc
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2804
                                                                                  • C:\Windows\System32\sc.exe
                                                                                    sc stop WaaSMedicSvc
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:5320
                                                                                  • C:\Windows\System32\sc.exe
                                                                                    sc stop wuauserv
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:4036
                                                                                  • C:\Windows\System32\sc.exe
                                                                                    sc stop bits
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:1788
                                                                                  • C:\Windows\System32\sc.exe
                                                                                    sc stop dosvc
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2380
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                  2⤵
                                                                                    PID:3924
                                                                                    • C:\Windows\System32\powercfg.exe
                                                                                      powercfg /x -hibernate-timeout-ac 0
                                                                                      3⤵
                                                                                        PID:4116
                                                                                      • C:\Windows\System32\powercfg.exe
                                                                                        powercfg /x -hibernate-timeout-dc 0
                                                                                        3⤵
                                                                                          PID:2840
                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                          powercfg /x -standby-timeout-ac 0
                                                                                          3⤵
                                                                                            PID:1116
                                                                                          • C:\Windows\System32\powercfg.exe
                                                                                            powercfg /x -standby-timeout-dc 0
                                                                                            3⤵
                                                                                              PID:5864
                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"
                                                                                            2⤵
                                                                                            • DcRat
                                                                                            • Creates scheduled task(s)
                                                                                            PID:3112
                                                                                          • C:\Windows\System32\conhost.exe
                                                                                            C:\Windows\System32\conhost.exe
                                                                                            2⤵
                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                            PID:4604
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                            2⤵
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:2832
                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\hfquevqyxqbr.xml"
                                                                                            2⤵
                                                                                            • DcRat
                                                                                            • Creates scheduled task(s)
                                                                                            PID:888
                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                            C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                                            2⤵
                                                                                              PID:5992
                                                                                            • C:\Windows\explorer.exe
                                                                                              C:\Windows\explorer.exe
                                                                                              2⤵
                                                                                                PID:2400
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                              1⤵
                                                                                                PID:4196
                                                                                              • \??\c:\windows\system32\svchost.exe
                                                                                                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                                1⤵
                                                                                                  PID:4444
                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                  1⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • Modifies registry class
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:4164
                                                                                                • C:\Windows\system32\browser_broker.exe
                                                                                                  C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                  1⤵
                                                                                                  • Modifies Internet Explorer settings
                                                                                                  PID:4004
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2064
                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1untilmathematicspro.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1untilmathematicspro.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Adds Run key to start application
                                                                                                  PID:1480
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:516
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:96
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:5392
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd.exe /c timeout /nobreak /t 3 & fsutil file setZeroData offset=0 length=5631 "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe" & erase "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe" & exit
                                                                                                        4⤵
                                                                                                          PID:6060
                                                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                                                            timeout /nobreak /t 3
                                                                                                            5⤵
                                                                                                            • Delays execution with timeout.exe
                                                                                                            PID:5920
                                                                                                          • C:\Windows\SysWOW64\fsutil.exe
                                                                                                            fsutil file setZeroData offset=0 length=5631 "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe"
                                                                                                            5⤵
                                                                                                              PID:5148
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematiics.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematiics.exe
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:4800
                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2440
                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                      1⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      • Modifies Internet Explorer settings
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1404
                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                      1⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      • Checks SCSI registry key(s)
                                                                                                      • Enumerates system info in registry
                                                                                                      • Modifies registry class
                                                                                                      PID:5168
                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      PID:5692
                                                                                                    • C:\Program Files\Google\Chrome\updater.exe
                                                                                                      "C:\Program Files\Google\Chrome\updater.exe"
                                                                                                      1⤵
                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                      • Drops file in Drivers directory
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      PID:6048
                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:5704
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:5280
                                                                                                    • C:\Users\Admin\AppData\Roaming\sjcehab
                                                                                                      C:\Users\Admin\AppData\Roaming\sjcehab
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      PID:5396
                                                                                                      • C:\Users\Admin\AppData\Roaming\sjcehab
                                                                                                        C:\Users\Admin\AppData\Roaming\sjcehab
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Checks SCSI registry key(s)
                                                                                                        • Suspicious behavior: MapViewOfSection
                                                                                                        PID:2220
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                      1⤵
                                                                                                        PID:5412
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          2⤵
                                                                                                            PID:1104
                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                          1⤵
                                                                                                          • Drops file in Windows directory
                                                                                                          • Modifies registry class
                                                                                                          PID:2168
                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                          1⤵
                                                                                                          • Modifies registry class
                                                                                                          PID:2216
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:5336
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                          1⤵
                                                                                                            PID:3760
                                                                                                          • \??\c:\windows\system32\svchost.exe
                                                                                                            c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                                            1⤵
                                                                                                              PID:4856
                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                              1⤵
                                                                                                                PID:5396
                                                                                                              • C:\Windows\system32\AUDIODG.EXE
                                                                                                                C:\Windows\system32\AUDIODG.EXE 0x3ac
                                                                                                                1⤵
                                                                                                                  PID:6108
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                                  1⤵
                                                                                                                    PID:4116
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
                                                                                                                    1⤵
                                                                                                                      PID:6116
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\pvJuKNH.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\pvJuKNH.exe 3Y /eGsite_idbTT 385118 /S
                                                                                                                      1⤵
                                                                                                                        PID:4308
                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                          2⤵
                                                                                                                            PID:5900
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:5564
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                  4⤵
                                                                                                                                    PID:5884
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:1752
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                    3⤵
                                                                                                                                      PID:5140
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                      3⤵
                                                                                                                                        PID:3760
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                        3⤵
                                                                                                                                          PID:5628
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                          3⤵
                                                                                                                                            PID:2800
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:5868
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                              3⤵
                                                                                                                                                PID:6020
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                  PID:2480
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5336
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                    3⤵
                                                                                                                                                      PID:6120
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                      3⤵
                                                                                                                                                        PID:6092
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3628
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1700
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4964
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                              3⤵
                                                                                                                                                                PID:2664
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5528
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4788
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5352
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1208
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2104
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1844
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:3080
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:5676
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1400
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:5348
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:3904
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:5112
                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DlbZONUGhjVU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DlbZONUGhjVU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GpfcWYRxKqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GpfcWYRxKqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KrPQunXfXpAVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KrPQunXfXpAVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oVhJPNkDU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oVhJPNkDU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nBRnpywzcTvqknVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nBRnpywzcTvqknVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\wUBDPVxDQVpvNZiy\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\wUBDPVxDQVpvNZiy\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:5468
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:6136
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:1388
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:5732
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GpfcWYRxKqUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:2188
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GpfcWYRxKqUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:1916
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KrPQunXfXpAVC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:4824
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KrPQunXfXpAVC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1324
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2128
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:96
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oVhJPNkDU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:5240
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oVhJPNkDU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:2848
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nBRnpywzcTvqknVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:6024
                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nBRnpywzcTvqknVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:3936
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5140
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4464
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5740
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4848
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\wUBDPVxDQVpvNZiy /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:2476
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\wUBDPVxDQVpvNZiy /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:5180
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                              schtasks /CREATE /TN "gyRAjBRmL" /SC once /ST 02:13:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • DcRat
                                                                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                                                                              PID:4228
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                              schtasks /run /I /tn "gyRAjBRmL"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:740
                                                                                                                                                                                                                            • C:\Windows\windefender.exe
                                                                                                                                                                                                                              C:\Windows\windefender.exe
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:484
                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:3628

                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\updater.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  df280925e135481b26e921dd1221e359

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  877737c142fdcc03c33e20d4f17c48a741373c9e

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  3da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487

                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\updater.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  df280925e135481b26e921dd1221e359

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  877737c142fdcc03c33e20d4f17c48a741373c9e

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  3da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  ad5cd538ca58cb28ede39c108acb5785

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1ae910026f3dbe90ed025e9e96ead2b5399be877

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\96DKDNLK\edgecompatviewlist[1].xml

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  74KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  d4fc49dc14f63895d997fa4940f24378

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  0366878d4768e27f1475b6535866e131

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  595c2e1d925ee8940af9b37c5ea8e5ab31e1ba74

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  f43bea54b9b690d4054a6d3d2f4e41d4e91d8a472ec20b6fd4cd378f40c30673

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  f09ef5ad654c9be9ca85ddd15f98045a8bbe321ddd5eb470f1d53878874f62f990f0befbf9055965e2d6a010da0be9e2228189bbfb8538190424a758bf63ad11

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\8HAGG9TN\favicon[1].ico

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  f3418a443e7d841097c714d69ec4bcb8

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  49263695f6b0cdd72f45cf1b775e660fdc36c606

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\KMQPL6UV\suggestions[1].en-US

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  17KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XAMS94NK\favicon[1].png

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  18c023bc439b446f91bf942270882422

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  768d59e3085976dba252232a65a4af562675f782

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.9MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b0f128c3579e6921cfff620179fb9864

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  60e19c987a96182206994ffd509d2849fdb427e3

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.9MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b0f128c3579e6921cfff620179fb9864

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  60e19c987a96182206994ffd509d2849fdb427e3

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.9MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b0f128c3579e6921cfff620179fb9864

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  60e19c987a96182206994ffd509d2849fdb427e3

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\assistant_installer.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  34afbc4605531efdbe6f6ce57f567c0a

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\dbghelp.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  861a07bcf2a5cb0dda1aaf6dfcb57b26

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\opera_package

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  94.4MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  0ba90769769f38c565fe368421b3b75f

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  09227068b5ddcc0ecff7dd0275569b3849770292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a981817ba6addd18fba84aee8418aabd9fd39c9812edbdf2c5a391fb7fb8e491

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  1d9ed4b1a02f4c70acd0f617eec3401a684b86e65fe7e9ea99ac2b83d3637eea6f93646fe671c0f5c9acf6b7d54ae8f9b12d23b7ad5d37981d3dd1804f1d8302

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\713497151363

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  66KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  17a5b683b29c8ec4a2ca44ddba65074f

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  0d62973a124d5a69f141729e7b54beb791d8ce8b

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  fdf7e0d20c8fc3988da9b1e60d2a44adcf7d4ca59cd8aacfca8fa57e4a4337bc

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  67b15302dda4e1c5e4bc96bfe756b8a47cdba48a6d0a394c02c80e2c253d69e9928e235dd485dd48562b00e6420dba7f3870f7bfac41eaa6dbacc42ef8090e74

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS2507.tmp\Install.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  60ddd726bba5ccd38361277c0b86f26c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  33bbc251be61a7fbf084f1e8540649f68dc18d52

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS2507.tmp\Install.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  60ddd726bba5ccd38361277c0b86f26c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  33bbc251be61a7fbf084f1e8540649f68dc18d52

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS2507.tmp\Install.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  60ddd726bba5ccd38361277c0b86f26c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  33bbc251be61a7fbf084f1e8540649f68dc18d52

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS584C.tmp\Install.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  cd3191644eeaab1d1cf9b4bea245f78c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  75f04b22e62b1366a4c5b2887242b63de1d83c9c

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  79ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1untilmathematicsproie1.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  257KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  de76cfb6df2a22fcaa41c2aef07d80fe

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  3968fd12d71f0d519812ea274d97e78d56aad3c3

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  7eca3910a2a0d47982a220f0b2be983d4ceda71259cab3968a3de8ece7bb3d0c

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  e1092082aa2bc72347f5d4eae3322f4f43e150180134fc3ecd298b81ce775763994c0380a15f120b729ea0a0f472ee5296230fc23f0d3b8aea09f20ca763827c

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lophime.bat

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  44B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  fc45457dedfbf780c80253e2672fe7b7

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  9451d39981fb83055423f067cf83ab70fed7c5ff

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  1870c4b141f595a028b8900a27d438eb4ff8de91a9f9ee09fea5fae4fbefa16b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  e9f338cadae170c5f433bd7a31f7388b729520d40b591bfb331385fcbc8f98684000ff0718abb01970b2ed6523a39d48682d186caf60fa86e5febdce72499133

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1untilmathematicspro.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  153ff56bd9694cc89fa63d823f3e263b

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b6ed120fe1c4de6ff9f6ea73b4139f6705fe0eba

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  9836a9797848a515147be66cbf3096e0d1241b7e7354ba4b9a0f19c0e3f80bcb

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  21b5470ebf7b654b07c926ab748b241cf3180ba8bff9182bfc4d653a195df1619d44e91329a17eb6b87345ba4c63e151d3fbd8de9ebf9c920723e1d9891a1d7f

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b09a192cc40a7d533c4416956ed1b98c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b1a15488e90284cf2a8ccd9668257def6eb23585

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf8ac11e13453e51c75eaaaff966b5eedcfb5ac4aa0c4e36826ff0faf032663f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ed2c4a50537be2b6d5f2c5dd3b4c174d27777f74ab144168359a12f07aa3e959f7836b79023b84caa4da76403e8bb18fb4e8bc342bcc10c7104216167e5dcc67

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b09a192cc40a7d533c4416956ed1b98c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b1a15488e90284cf2a8ccd9668257def6eb23585

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf8ac11e13453e51c75eaaaff966b5eedcfb5ac4aa0c4e36826ff0faf032663f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ed2c4a50537be2b6d5f2c5dd3b4c174d27777f74ab144168359a12f07aa3e959f7836b79023b84caa4da76403e8bb18fb4e8bc342bcc10c7104216167e5dcc67

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b09a192cc40a7d533c4416956ed1b98c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b1a15488e90284cf2a8ccd9668257def6eb23585

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf8ac11e13453e51c75eaaaff966b5eedcfb5ac4aa0c4e36826ff0faf032663f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ed2c4a50537be2b6d5f2c5dd3b4c174d27777f74ab144168359a12f07aa3e959f7836b79023b84caa4da76403e8bb18fb4e8bc342bcc10c7104216167e5dcc67

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  b09a192cc40a7d533c4416956ed1b98c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b1a15488e90284cf2a8ccd9668257def6eb23585

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  cf8ac11e13453e51c75eaaaff966b5eedcfb5ac4aa0c4e36826ff0faf032663f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ed2c4a50537be2b6d5f2c5dd3b4c174d27777f74ab144168359a12f07aa3e959f7836b79023b84caa4da76403e8bb18fb4e8bc342bcc10c7104216167e5dcc67

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematiics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  824c9a0a5fcbae7fff25b4827eabe947

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  136b7d1be4b626fa2c313b52f43b1a7dd801c381

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  3238b06d2e48d435f105fa005a5c42cb2340037e599813ce5218c00fb140e46c

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  47c1a5fdbc98d115425eb896c2cc243ad05d216d23b8ea0d932db710251972473d1b5a54e4b3830c343ec993ffd1d1105ce69349c4c035715ef465d988768643

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\untilmathematiics.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  824c9a0a5fcbae7fff25b4827eabe947

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  136b7d1be4b626fa2c313b52f43b1a7dd801c381

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  3238b06d2e48d435f105fa005a5c42cb2340037e599813ce5218c00fb140e46c

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  47c1a5fdbc98d115425eb896c2cc243ad05d216d23b8ea0d932db710251972473d1b5a54e4b3830c343ec993ffd1d1105ce69349c4c035715ef465d988768643

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310200528547474108.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_04iea2gd.cnm.ps1

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  546d67a48ff2bf7682cea9fac07b942e

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  8438d1918079c3bd6c14c314e1f9b061

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  9a51c1ba9715098a368a13c4868a5300e8682923

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  66e30718335fa995d787958dafbbaa3cd54d50792399166d6e9ad340826a6f44

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  cec5348e994dc21b9ba7f37c3b79b62d2f80b19855af6e9cd618e99e431f19c32159c7099a7ab7cb78ed99cb2d8e35f2cd8acf8da8a4c6c79917dcfc6f28e57a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  8438d1918079c3bd6c14c314e1f9b061

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  9a51c1ba9715098a368a13c4868a5300e8682923

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  66e30718335fa995d787958dafbbaa3cd54d50792399166d6e9ad340826a6f44

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  cec5348e994dc21b9ba7f37c3b79b62d2f80b19855af6e9cd618e99e431f19c32159c7099a7ab7cb78ed99cb2d8e35f2cd8acf8da8a4c6c79917dcfc6f28e57a

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\sjcehab

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\sjcehab

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\sjcehab

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\sjcehab

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\0NXT9gOYBwoqIoxeAhF3CFKt.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  f8afdb9c14d835a31257c79a82eed356

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b0a4fcd6f5d61b076e007d4c8712f63e4e36182f

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  58799f8135040c64722f91150fd79853bf0423c6e52c1e5afef79a3aa2ba9d67

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  11b85094b1972025f1a8c425afdf2005d67173a06f482afcca0df91df437659b2448a104b86b459fa4bed98c26f718215c62816e1faf933834678018896545a2

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\0NXT9gOYBwoqIoxeAhF3CFKt.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  f8afdb9c14d835a31257c79a82eed356

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  b0a4fcd6f5d61b076e007d4c8712f63e4e36182f

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  58799f8135040c64722f91150fd79853bf0423c6e52c1e5afef79a3aa2ba9d67

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  11b85094b1972025f1a8c425afdf2005d67173a06f482afcca0df91df437659b2448a104b86b459fa4bed98c26f718215c62816e1faf933834678018896545a2

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\1M7nCvDh3PNQLFPb4UD3ymKE.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  288KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  d5c07326071e34b28ce94e867f11e03d

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  e9ea832b7a9eb3078b703bbba9d9be31b0378d17

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  89ecd4d3608b88b795626091ab8e31b64009b32223b8cbc0120afb0b2005e528

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ad1a7a19fe727ca22f6dee9e3ed39bb8b1a7c253e463e0e85c4d23dfb50883dc599091a132a396f1144abf563b8cea6b255eb1d31996e59f99e1a94346f8c4b3

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\1M7nCvDh3PNQLFPb4UD3ymKE.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  288KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  d5c07326071e34b28ce94e867f11e03d

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  e9ea832b7a9eb3078b703bbba9d9be31b0378d17

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  89ecd4d3608b88b795626091ab8e31b64009b32223b8cbc0120afb0b2005e528

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ad1a7a19fe727ca22f6dee9e3ed39bb8b1a7c253e463e0e85c4d23dfb50883dc599091a132a396f1144abf563b8cea6b255eb1d31996e59f99e1a94346f8c4b3

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\2c66QpzrBNaVk8Cvfeka834d.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\2c66QpzrBNaVk8Cvfeka834d.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  226KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  aebaf57299cd368f842cfa98f3b1658c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  7926cf5b65e755879a45aeb8a155cf21

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1acfab0d7e5ec6aad9685d4c4729417fe0bb16ce

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  bd952f0e8b83dae2d88fd462fd1cc86dd88c3c02621b6198f52fe58b34767407

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ebcb6f3fba9da07b8086034a0c178e595040f90de917120c3852107edde1b0b39ad5ee6eb4747bc452cd2709c1764928dc2995c347e7560f7b022626cd579cb9

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\COxLcolSkHTXD96wS8IOl23P.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  7926cf5b65e755879a45aeb8a155cf21

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1acfab0d7e5ec6aad9685d4c4729417fe0bb16ce

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  bd952f0e8b83dae2d88fd462fd1cc86dd88c3c02621b6198f52fe58b34767407

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ebcb6f3fba9da07b8086034a0c178e595040f90de917120c3852107edde1b0b39ad5ee6eb4747bc452cd2709c1764928dc2995c347e7560f7b022626cd579cb9

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Ck6JaYbPjE69sS7HEuansNao.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  df280925e135481b26e921dd1221e359

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  877737c142fdcc03c33e20d4f17c48a741373c9e

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  3da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Ck6JaYbPjE69sS7HEuansNao.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  df280925e135481b26e921dd1221e359

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  877737c142fdcc03c33e20d4f17c48a741373c9e

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  3da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\G3ImObVE2d9kbY90Hwgd2MeI.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3f0327c71d8e1e24388a84180fa8b480

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  374e206fe9041291ba6f1d9542fee8d3500d90e2

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a1c45634f00175678d1a854f3f9ae373a17e3ffeb8594b730aa731742b5a460b

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  66703ae8380b6cb2c6c55100a28ad934fd630bf32e174c98328c9716901e7168242575e0c80c4007e5e6710b7b76329c4264dcfe4a49758605c57ef7f44fe943

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Ur2sexpNXs9GmvqbXR1KBOZv.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  fcad815e470706329e4e327194acc07c

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  c4edd81d00318734028d73be94bc3904373018a9

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  280d939a66a0107297091b3b6f86d6529ef6fac222a85dbc82822c3d5dc372b8

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  f4031b49946da7c6c270e0354ac845b5c77b9dfcd267442e0571dd33ccd5146bc352ed42b59800c9d166c8c1ede61469a00a4e8d3738d937502584e8a1b72485

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\fH6NDa3cG1U5BG6DAfMqN7Nr.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  270KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a1b385a317272c87219e9b726688f4a6

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1db768ec012b763be1ec3c0955beb82aadbda943

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  eee458a99c91773892bbd37345bed29cd16c68fdc4b5289a39a61aa89baed5e5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  2032db65fdbf7ae9e0ccbc22cfb9605ed08b5cf713b1450c498793b7f56ca5830d68afaba4009afa7ea6626e32e170751ff237edd27a04efbbbe1cf9e23b776c

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\jZHNzXhQ71sMIOcSyYzMKZpq.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  823b5fcdef282c5318b670008b9e6922

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  d20cd5321d8a3d423af4c6dabc0ac905796bdc6d

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\jZHNzXhQ71sMIOcSyYzMKZpq.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  823b5fcdef282c5318b670008b9e6922

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  d20cd5321d8a3d423af4c6dabc0ac905796bdc6d

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  19247bc85b88872bef95469d9b9e32fd

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  527b7246ded8a9962b0722e0e3505cbaa5cec419

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  c776f77ec7d14f55ed5ee0efdd92dde13db0ef684b831c474225a4c9f7772d47

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  fb2693c3607bf09f3b8d37fcf39ac32770403a0c0079620fc614c99ac5fcdfe1159ae50610aefc615510d395464ecd681bff96d90410f8f3717c75114d1b0c0a

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\m5ztgUgjXShufREehwRhjxBQ.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  19247bc85b88872bef95469d9b9e32fd

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  527b7246ded8a9962b0722e0e3505cbaa5cec419

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  c776f77ec7d14f55ed5ee0efdd92dde13db0ef684b831c474225a4c9f7772d47

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  fb2693c3607bf09f3b8d37fcf39ac32770403a0c0079620fc614c99ac5fcdfe1159ae50610aefc615510d395464ecd681bff96d90410f8f3717c75114d1b0c0a

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\mMHfQyCad8nYTIadB4X4arA4.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  7.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3111f8d446efd3c0a0e2c91cbf303998

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  da86c8d200f799d6467e74e1ea65781078f50be7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  7ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  0f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\mMHfQyCad8nYTIadB4X4arA4.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  7.1MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  3111f8d446efd3c0a0e2c91cbf303998

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  da86c8d200f799d6467e74e1ea65781078f50be7

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  7ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  0f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\qS1lvzXBmbQbFaXBvGL1ej9Q.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  357KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  04bd0fb95aa8106073c726d402010552

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  6d3e1959202bf41893fd0ab3f92ef3e270724562

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a2a637c64a264635a662cab6f690c152f774150a98012adb843353f66d6c8f4f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  92b219514f4a752a54205578c49a2f942286e550b92500c9c317bb27c7a77d5316db5933dcc0cb445a3eab67effac82762a7185dffb3b85d8f5a3d6fa457acd1

                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\qS1lvzXBmbQbFaXBvGL1ej9Q.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  357KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  04bd0fb95aa8106073c726d402010552

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  6d3e1959202bf41893fd0ab3f92ef3e270724562

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  a2a637c64a264635a662cab6f690c152f774150a98012adb843353f66d6c8f4f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  92b219514f4a752a54205578c49a2f942286e550b92500c9c317bb27c7a77d5316db5933dcc0cb445a3eab67effac82762a7185dffb3b85d8f5a3d6fa457acd1

                                                                                                                                                                                                                                • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  127B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                                                • C:\Windows\rss\csrss.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  7926cf5b65e755879a45aeb8a155cf21

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1acfab0d7e5ec6aad9685d4c4729417fe0bb16ce

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  bd952f0e8b83dae2d88fd462fd1cc86dd88c3c02621b6198f52fe58b34767407

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ebcb6f3fba9da07b8086034a0c178e595040f90de917120c3852107edde1b0b39ad5ee6eb4747bc452cd2709c1764928dc2995c347e7560f7b022626cd579cb9

                                                                                                                                                                                                                                • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  268B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                                                                                                • \ProgramData\mozglue.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  593KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                                • \ProgramData\nss3.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310200528551\assistant\dbghelp.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  861a07bcf2a5cb0dda1aaf6dfcb57b26

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2310200528470642328.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2310200528502825028.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2310200528547474108.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2310200528558572596.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2310200528565601608.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1312b9c3111e7eaea09326ff644feb04

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  114f2fd35c67fe5378e0cac3335485eb2ae8f292

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a

                                                                                                                                                                                                                                • memory/516-308-0x0000000000A60000-0x0000000000A68000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                • memory/516-387-0x0000000005550000-0x0000000005560000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/516-386-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/516-399-0x0000000006100000-0x000000000614C000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  304KB

                                                                                                                                                                                                                                • memory/516-450-0x0000000005550000-0x0000000005560000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/516-448-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/516-352-0x00000000068C0000-0x0000000006932000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  456KB

                                                                                                                                                                                                                                • memory/516-321-0x00000000064E0000-0x0000000006564000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  528KB

                                                                                                                                                                                                                                • memory/912-198-0x0000000002860000-0x0000000002C5D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.0MB

                                                                                                                                                                                                                                • memory/912-183-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.1MB

                                                                                                                                                                                                                                • memory/912-426-0x0000000002860000-0x0000000002C5D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.0MB

                                                                                                                                                                                                                                • memory/912-427-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.1MB

                                                                                                                                                                                                                                • memory/996-98-0x0000000000930000-0x0000000000939000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                • memory/996-97-0x0000000000830000-0x0000000000930000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1024KB

                                                                                                                                                                                                                                • memory/1316-142-0x00007FF7FED50000-0x00007FF7FF418000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.8MB

                                                                                                                                                                                                                                • memory/1608-201-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/2224-190-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.8MB

                                                                                                                                                                                                                                • memory/2224-92-0x00000000024B0000-0x0000000002501000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  324KB

                                                                                                                                                                                                                                • memory/2224-93-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.8MB

                                                                                                                                                                                                                                • memory/2224-152-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  972KB

                                                                                                                                                                                                                                • memory/2224-94-0x0000000000A10000-0x0000000000B10000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1024KB

                                                                                                                                                                                                                                • memory/2224-394-0x0000000000A10000-0x0000000000B10000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1024KB

                                                                                                                                                                                                                                • memory/2224-389-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.8MB

                                                                                                                                                                                                                                • memory/2328-88-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/2560-0-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                • memory/2560-2-0x0000000004D40000-0x0000000004D50000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/2560-100-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/2560-108-0x0000000004D40000-0x0000000004D50000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/2560-1-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/2596-217-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/3196-155-0x0000000000B50000-0x0000000000B66000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                • memory/4040-451-0x000001CDFC6C0000-0x000001CDFC6D0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4040-444-0x000001CDFC6C0000-0x000001CDFC6D0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4040-437-0x00007FFF8C8C0000-0x00007FFF8D2AC000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.9MB

                                                                                                                                                                                                                                • memory/4040-375-0x000001CDFC6C0000-0x000001CDFC6D0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4040-388-0x000001CDFC6C0000-0x000001CDFC6D0000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4040-306-0x000001CDFC8B0000-0x000001CDFC926000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  472KB

                                                                                                                                                                                                                                • memory/4040-351-0x00007FFF8C8C0000-0x00007FFF8D2AC000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.9MB

                                                                                                                                                                                                                                • memory/4040-274-0x000001CDFC700000-0x000001CDFC722000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                • memory/4080-403-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4080-417-0x00000000052B0000-0x00000000052E6000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  216KB

                                                                                                                                                                                                                                • memory/4080-428-0x0000000007530000-0x0000000007540000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4080-414-0x0000000007530000-0x0000000007540000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4080-473-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4108-150-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/4108-144-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/4164-235-0x0000015930520000-0x0000015930530000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4164-251-0x0000015930900000-0x0000015930910000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4464-182-0x00007FF6739C0000-0x00007FF673F03000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/4612-430-0x0000000006F30000-0x0000000006F40000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4612-460-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4612-402-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4612-413-0x0000000006F30000-0x0000000006F40000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4732-226-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4732-143-0x0000000005980000-0x0000000005990000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4732-80-0x0000000000B10000-0x0000000000E2C000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                                • memory/4732-421-0x0000000005980000-0x0000000005990000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                • memory/4732-81-0x00000000733C0000-0x0000000073AAE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                                • memory/4732-85-0x0000000005B00000-0x0000000005FFE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.0MB

                                                                                                                                                                                                                                • memory/4732-227-0x00000000075D0000-0x00000000075DA000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                • memory/4732-216-0x0000000006B00000-0x000000000702C000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                                • memory/4732-87-0x00000000056E0000-0x0000000005772000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  584KB

                                                                                                                                                                                                                                • memory/4732-117-0x0000000005780000-0x000000000581C000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  624KB

                                                                                                                                                                                                                                • memory/4732-120-0x0000000005820000-0x0000000005886000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                                • memory/4732-109-0x0000000006000000-0x00000000061C2000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                                • memory/4736-149-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.1MB

                                                                                                                                                                                                                                • memory/4736-104-0x0000000002DF0000-0x00000000036DB000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  8.9MB

                                                                                                                                                                                                                                • memory/4736-103-0x00000000029F0000-0x0000000002DEF000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.0MB

                                                                                                                                                                                                                                • memory/4736-419-0x0000000002DF0000-0x00000000036DB000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  8.9MB

                                                                                                                                                                                                                                • memory/4736-420-0x00000000029F0000-0x0000000002DEF000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4.0MB

                                                                                                                                                                                                                                • memory/4736-425-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  9.1MB

                                                                                                                                                                                                                                • memory/5028-156-0x00000000009C0000-0x0000000000F0D000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.3MB

                                                                                                                                                                                                                                • memory/5064-99-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                • memory/5064-118-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                • memory/5064-159-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                • memory/5776-458-0x0000000000FB0000-0x000000000169F000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  6.9MB