Analysis

  • max time kernel
    133s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2023 16:43

General

  • Target

    3e9c5961ee8a2a0c30539e79f9ddfb8870f5488d9571562fb1d90c8440dffdf3exe.exe

  • Size

    2.0MB

  • MD5

    05cdfd712f5e27594b9a21a279375410

  • SHA1

    073ff34df1c5aaa62c2e3066e67cf05469788f09

  • SHA256

    3e9c5961ee8a2a0c30539e79f9ddfb8870f5488d9571562fb1d90c8440dffdf3

  • SHA512

    8d5906fde6d88945ca8617c6d0a3698bb98aa867fdfbe5a03bdcff5acf60120958cb2c08458fa78fa098159c00ae13f9d8d5224a95f6d08879db489046fee5d3

  • SSDEEP

    49152:3/RCihRpUHZ5hpFeC9qN4eTWMWCRH3Zmo3ye9:PRCi1k5hpAN6eTWMxJB

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 9 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 20 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3188
      • C:\Users\Admin\AppData\Local\Temp\3e9c5961ee8a2a0c30539e79f9ddfb8870f5488d9571562fb1d90c8440dffdf3exe.exe
        "C:\Users\Admin\AppData\Local\Temp\3e9c5961ee8a2a0c30539e79f9ddfb8870f5488d9571562fb1d90c8440dffdf3exe.exe"
        2⤵
        • UAC bypass
        • Windows security bypass
        • Checks computer location settings
        • Windows security modification
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4948
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3e9c5961ee8a2a0c30539e79f9ddfb8870f5488d9571562fb1d90c8440dffdf3exe.exe" -Force
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5016
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
          3⤵
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Users\Admin\Pictures\Zti3zCTi94E735zxrLrKOC7S.exe
            "C:\Users\Admin\Pictures\Zti3zCTi94E735zxrLrKOC7S.exe"
            4⤵
            • Executes dropped EXE
            PID:4232
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 2236
              5⤵
              • Program crash
              PID:4764
          • C:\Users\Admin\Pictures\m0Ky1ZovOeYjny1mdFPv8l0K.exe
            "C:\Users\Admin\Pictures\m0Ky1ZovOeYjny1mdFPv8l0K.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1980
            • C:\Users\Admin\AppData\Local\Temp\Broom.exe
              C:\Users\Admin\AppData\Local\Temp\Broom.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4728
          • C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe
            "C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4172
            • C:\Users\Admin\AppData\Local\Temp\is-H2FGJ.tmp\Vo4ockirxs7DPYbPscJ15FFq.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-H2FGJ.tmp\Vo4ockirxs7DPYbPscJ15FFq.tmp" /SL5="$70170,3236603,54272,C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:64
              • C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe
                "C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe" -i
                6⤵
                • Executes dropped EXE
                PID:4956
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /Query
                6⤵
                  PID:1860
                • C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe
                  "C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe" -s
                  6⤵
                  • Executes dropped EXE
                  PID:4884
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\system32\net.exe" helpmsg 29
                  6⤵
                    PID:3220
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 helpmsg 29
                      7⤵
                        PID:4556
                • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe
                  "C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:920
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2760
                  • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe
                    "C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe"
                    5⤵
                    • Executes dropped EXE
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Modifies data under HKEY_USERS
                    PID:892
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1964
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      6⤵
                        PID:4972
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          7⤵
                          • Modifies Windows Firewall
                          PID:868
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4648
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                          PID:3288
                        • C:\Windows\rss\csrss.exe
                          C:\Windows\rss\csrss.exe
                          6⤵
                            PID:556
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              7⤵
                                PID:1784
                        • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe
                          "C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe" --silent --allusers=0
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          • Modifies system certificate store
                          • Suspicious use of WriteProcessMemory
                          PID:2336
                          • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe
                            C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2cc,0x2fc,0x6f6774f0,0x6f677500,0x6f67750c
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:3852
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\WIgH9EJ0lY733XYr7bR79vMm.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\WIgH9EJ0lY733XYr7bR79vMm.exe" --version
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1316
                          • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe
                            "C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2336 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231129164459" --session-guid=2b6a200b-4ec4-4f4d-82ea-4196f1a2376e --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=1C05000000000000
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates connected drives
                            • Suspicious use of WriteProcessMemory
                            PID:1564
                            • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe
                              C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6dba74f0,0x6dba7500,0x6dba750c
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2672
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:2240
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe" --version
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:4252
                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe
                              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0xf71588,0xf71598,0xf715a4
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:3332
                        • C:\Users\Admin\Pictures\jdwZajcq8cUHu4Cliyt6PvAk.exe
                          "C:\Users\Admin\Pictures\jdwZajcq8cUHu4Cliyt6PvAk.exe"
                          4⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in Drivers directory
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1948
                        • C:\Users\Admin\Pictures\NYTzCBZjsqecAwLqE3Fmi2tp.exe
                          "C:\Users\Admin\Pictures\NYTzCBZjsqecAwLqE3Fmi2tp.exe" /S
                          4⤵
                          • Modifies WinLogon for persistence
                          • Adds policy Run key to start application
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:2040
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1604
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                      2⤵
                        PID:3912
                        • C:\Windows\System32\sc.exe
                          sc stop UsoSvc
                          3⤵
                          • Launches sc.exe
                          PID:2156
                        • C:\Windows\System32\sc.exe
                          sc stop WaaSMedicSvc
                          3⤵
                          • Launches sc.exe
                          PID:112
                        • C:\Windows\System32\sc.exe
                          sc stop wuauserv
                          3⤵
                          • Launches sc.exe
                          PID:1396
                        • C:\Windows\System32\sc.exe
                          sc stop bits
                          3⤵
                          • Launches sc.exe
                          PID:4476
                        • C:\Windows\System32\sc.exe
                          sc stop dosvc
                          3⤵
                          • Launches sc.exe
                          PID:4568
                      • C:\Windows\System32\schtasks.exe
                        C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
                        2⤵
                          PID:752
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                          2⤵
                            PID:1692
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4060
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4980
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4328
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3916
                          • C:\Windows\System32\schtasks.exe
                            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\tlxvacrdjkek.xml"
                            2⤵
                            • Creates scheduled task(s)
                            PID:4648
                          • C:\Windows\System32\schtasks.exe
                            C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                            2⤵
                              PID:3648
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                              2⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4976
                            • C:\Windows\System32\cmd.exe
                              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                              2⤵
                                PID:5048
                                • C:\Windows\System32\sc.exe
                                  sc stop UsoSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:2796
                                • C:\Windows\System32\sc.exe
                                  sc stop WaaSMedicSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:2868
                                • C:\Windows\System32\sc.exe
                                  sc stop wuauserv
                                  3⤵
                                  • Launches sc.exe
                                  PID:3916
                                • C:\Windows\System32\sc.exe
                                  sc stop bits
                                  3⤵
                                  • Launches sc.exe
                                  PID:3392
                                • C:\Windows\System32\sc.exe
                                  sc stop dosvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:4876
                              • C:\Windows\System32\cmd.exe
                                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                2⤵
                                  PID:4820
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -hibernate-timeout-ac 0
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4056
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -hibernate-timeout-dc 0
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1368
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -standby-timeout-ac 0
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:396
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -standby-timeout-dc 0
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4340
                                • C:\Windows\System32\schtasks.exe
                                  C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\tlxvacrdjkek.xml"
                                  2⤵
                                  • Creates scheduled task(s)
                                  PID:3504
                                • C:\Windows\System32\conhost.exe
                                  C:\Windows\System32\conhost.exe
                                  2⤵
                                    PID:2860
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1760
                                • C:\Windows\SysWOW64\taskkill.exe
                                  "C:\Windows\System32\taskkill.exe" /F /IM apphost.exe
                                  1⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4820
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4232 -ip 4232
                                  1⤵
                                    PID:1404
                                  • C:\Program Files\Google\Chrome\updater.exe
                                    "C:\Program Files\Google\Chrome\updater.exe"
                                    1⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Drops file in Drivers directory
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2620

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    94048519b8d78515584c07ac3ec04521

                                    SHA1

                                    186bb44226d6355ebf062a0aac072c45b93bce26

                                    SHA256

                                    6f4c421deb9a43399242cea88363e0d8417409960481deb2cce3bdfc04a9db03

                                    SHA512

                                    d908ccd4649ec462c501f55fd3e73c43904583402796f632c68991f601e6cfe08ebde32df6d1004fffcf5986b9646a753c949fd68d8307c0abe7c69a224b0274

                                  • C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    94048519b8d78515584c07ac3ec04521

                                    SHA1

                                    186bb44226d6355ebf062a0aac072c45b93bce26

                                    SHA256

                                    6f4c421deb9a43399242cea88363e0d8417409960481deb2cce3bdfc04a9db03

                                    SHA512

                                    d908ccd4649ec462c501f55fd3e73c43904583402796f632c68991f601e6cfe08ebde32df6d1004fffcf5986b9646a753c949fd68d8307c0abe7c69a224b0274

                                  • C:\Program Files (x86)\Common Files\VolumeUTIL\VolumeUTIL.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    94048519b8d78515584c07ac3ec04521

                                    SHA1

                                    186bb44226d6355ebf062a0aac072c45b93bce26

                                    SHA256

                                    6f4c421deb9a43399242cea88363e0d8417409960481deb2cce3bdfc04a9db03

                                    SHA512

                                    d908ccd4649ec462c501f55fd3e73c43904583402796f632c68991f601e6cfe08ebde32df6d1004fffcf5986b9646a753c949fd68d8307c0abe7c69a224b0274

                                  • C:\Program Files\Google\Chrome\updater.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    9873907d252dcecd6baea9a11ac4b0da

                                    SHA1

                                    102562c75d3dbb2c9b2922674f83c5f0f36e3d0c

                                    SHA256

                                    a5c68511132b9590f0d60bc6fa5f43999c25d636d0b29aae1ff3787688907fe7

                                    SHA512

                                    2054607e09f31d65060a8b8205755f785b5ea0be9b248977b00fa95ed2938313309876d91b7fef5d33866024cf52cf0dd7a73336e703e035770e24b506db19c8

                                  • C:\Program Files\Google\Chrome\updater.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    9873907d252dcecd6baea9a11ac4b0da

                                    SHA1

                                    102562c75d3dbb2c9b2922674f83c5f0f36e3d0c

                                    SHA256

                                    a5c68511132b9590f0d60bc6fa5f43999c25d636d0b29aae1ff3787688907fe7

                                    SHA512

                                    2054607e09f31d65060a8b8205755f785b5ea0be9b248977b00fa95ed2938313309876d91b7fef5d33866024cf52cf0dd7a73336e703e035770e24b506db19c8

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    968cb9309758126772781b83adb8a28f

                                    SHA1

                                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                                    SHA256

                                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                    SHA512

                                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                    Filesize

                                    53KB

                                    MD5

                                    30bdd72d656ae6214ec049014fa0d48b

                                    SHA1

                                    74ebcbebaac78647a140fa62804a43bd4f5a63a8

                                    SHA256

                                    68553c17f526225063e92c48a67b0b641156e08ad1f4ebb83691a566c5888f02

                                    SHA512

                                    ebe2794d8cae37e7f4c8ae6b7b28e64589b4aa6a23c2ed991aa22356d8d975df28c471886b0bd3a01ee8bd54a38cccf552f0bceed1e0f59a13a1901635bf804c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                    Filesize

                                    53KB

                                    MD5

                                    e631cc98b67c8256c2fc777753ec7953

                                    SHA1

                                    1241037823c7d04913b961346b12b4d958d822f0

                                    SHA256

                                    583ba1a3ed33ea75ebb9c5f18476ba3c2705763f6b049b52250b09101c328074

                                    SHA512

                                    de5fd55500c377ba78459394af46da1e422de2d9f6a917d9a275de1bdfe9a5162057cd8f22bf739b6d5426c10545eb7202a83bc0b1a5d2a514f6c82a3c7bfa1f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    18KB

                                    MD5

                                    241d8d97a0cdf570f3c1ab8ab5bb648c

                                    SHA1

                                    4186bdb2f8e9b6261653ddde4190a4d2221514d3

                                    SHA256

                                    fcfaafeea8b2262ea5d07336d5a30f91f51826b7479a3f96a7727ad47272312a

                                    SHA512

                                    06b4fe837c50b48aee2ae9a81ee88ba443755065c665193911e280cebda5f1fc6f7bde2258349834ce8a7abfa25c74c981661d7434d37bb4523592aec5434130

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\additional_file0.tmp

                                    Filesize

                                    1.9MB

                                    MD5

                                    b0f128c3579e6921cfff620179fb9864

                                    SHA1

                                    60e19c987a96182206994ffd509d2849fdb427e3

                                    SHA256

                                    1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                    SHA512

                                    17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                    Filesize

                                    1.9MB

                                    MD5

                                    b0f128c3579e6921cfff620179fb9864

                                    SHA1

                                    60e19c987a96182206994ffd509d2849fdb427e3

                                    SHA256

                                    1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                    SHA512

                                    17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                    Filesize

                                    1.9MB

                                    MD5

                                    b0f128c3579e6921cfff620179fb9864

                                    SHA1

                                    60e19c987a96182206994ffd509d2849fdb427e3

                                    SHA256

                                    1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                    SHA512

                                    17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    34afbc4605531efdbe6f6ce57f567c0a

                                    SHA1

                                    6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                                    SHA256

                                    0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                                    SHA512

                                    577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\assistant_installer.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    34afbc4605531efdbe6f6ce57f567c0a

                                    SHA1

                                    6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                                    SHA256

                                    0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                                    SHA512

                                    577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbgcore.DLL

                                    Filesize

                                    166KB

                                    MD5

                                    5a6cd2117967ec78e7195b6ee10fc4da

                                    SHA1

                                    72d929eeb50dd58861a1d4cf13902c0b89fadc34

                                    SHA256

                                    a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                                    SHA512

                                    07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbgcore.dll

                                    Filesize

                                    166KB

                                    MD5

                                    5a6cd2117967ec78e7195b6ee10fc4da

                                    SHA1

                                    72d929eeb50dd58861a1d4cf13902c0b89fadc34

                                    SHA256

                                    a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                                    SHA512

                                    07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbgcore.dll

                                    Filesize

                                    166KB

                                    MD5

                                    5a6cd2117967ec78e7195b6ee10fc4da

                                    SHA1

                                    72d929eeb50dd58861a1d4cf13902c0b89fadc34

                                    SHA256

                                    a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                                    SHA512

                                    07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbghelp.dll

                                    Filesize

                                    1.7MB

                                    MD5

                                    861a07bcf2a5cb0dda1aaf6dfcb57b26

                                    SHA1

                                    a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                    SHA256

                                    7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                    SHA512

                                    062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbghelp.dll

                                    Filesize

                                    1.7MB

                                    MD5

                                    861a07bcf2a5cb0dda1aaf6dfcb57b26

                                    SHA1

                                    a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                    SHA256

                                    7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                    SHA512

                                    062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\assistant\dbghelp.dll

                                    Filesize

                                    1.7MB

                                    MD5

                                    861a07bcf2a5cb0dda1aaf6dfcb57b26

                                    SHA1

                                    a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                    SHA256

                                    7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                    SHA512

                                    062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311291644591\opera_package

                                    Filesize

                                    103.2MB

                                    MD5

                                    cd9f0e806df2940eb154570ca58a807c

                                    SHA1

                                    d2bdb70ad13344f3813f467c229a50fd8e17632a

                                    SHA256

                                    71250e7a474c08ea862cf870a07a9e98fad75acc15a2b1cf34775da27650fc51

                                    SHA512

                                    2e132053cc6238aaa9cd05fa8520b89412d27ab85b71bcb00b8d71ed207cd34115f8bcb272b617824dc9907297d034d736042a3a55be566101d4fd3fbf80ac91

                                  • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                    Filesize

                                    5.3MB

                                    MD5

                                    00e93456aa5bcf9f60f84b0c0760a212

                                    SHA1

                                    6096890893116e75bd46fea0b8c3921ceb33f57d

                                    SHA256

                                    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                    SHA512

                                    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291644530292336.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291644572953852.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291644586391316.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291644586391316.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291644595141564.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311291645001702672.dll

                                    Filesize

                                    4.6MB

                                    MD5

                                    21b50971a7fddce167df551192f3f5bd

                                    SHA1

                                    83b5148b53da8965eb0292129c5f224cc6bd0261

                                    SHA256

                                    74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                    SHA512

                                    f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pnszdglf.e5f.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\is-H2FGJ.tmp\Vo4ockirxs7DPYbPscJ15FFq.tmp

                                    Filesize

                                    694KB

                                    MD5

                                    5525670a9e72d77b368a9aa4b8c814c1

                                    SHA1

                                    3fdad952ea00175f3a6e549b5dca4f568e394612

                                    SHA256

                                    1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                                    SHA512

                                    757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                                  • C:\Users\Admin\AppData\Local\Temp\is-H2FGJ.tmp\Vo4ockirxs7DPYbPscJ15FFq.tmp

                                    Filesize

                                    694KB

                                    MD5

                                    5525670a9e72d77b368a9aa4b8c814c1

                                    SHA1

                                    3fdad952ea00175f3a6e549b5dca4f568e394612

                                    SHA256

                                    1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                                    SHA512

                                    757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                                  • C:\Users\Admin\AppData\Local\Temp\is-KE029.tmp\_isetup\_iscrypt.dll

                                    Filesize

                                    2KB

                                    MD5

                                    a69559718ab506675e907fe49deb71e9

                                    SHA1

                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                    SHA256

                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                    SHA512

                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                  • C:\Users\Admin\AppData\Local\Temp\is-KE029.tmp\_isetup\_isdecmp.dll

                                    Filesize

                                    13KB

                                    MD5

                                    a813d18268affd4763dde940246dc7e5

                                    SHA1

                                    c7366e1fd925c17cc6068001bd38eaef5b42852f

                                    SHA256

                                    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                    SHA512

                                    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                  • C:\Users\Admin\AppData\Local\Temp\is-KE029.tmp\_isetup\_isdecmp.dll

                                    Filesize

                                    13KB

                                    MD5

                                    a813d18268affd4763dde940246dc7e5

                                    SHA1

                                    c7366e1fd925c17cc6068001bd38eaef5b42852f

                                    SHA256

                                    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                    SHA512

                                    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                  • C:\Users\Admin\AppData\Local\Temp\tlxvacrdjkek.xml

                                    Filesize

                                    1KB

                                    MD5

                                    546d67a48ff2bf7682cea9fac07b942e

                                    SHA1

                                    a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                                    SHA256

                                    eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                                    SHA512

                                    10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

                                  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    617bfcf34d51647b3e1177684d100d96

                                    SHA1

                                    496e5f2c95cbe3c7c2305a30556f782749c72d1c

                                    SHA256

                                    d2d2f401ac9473c5c760f9d178294cca3918b0de4c41e98319121bc2a3bcc239

                                    SHA512

                                    ba427a02328c2c92a5da23d48d9babbd63da9a610c5fffd42252f72a2199efaee230dec7c0fb88542c5bc322151cfd377467e48448bff965a48266f89c984eb2

                                  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    617bfcf34d51647b3e1177684d100d96

                                    SHA1

                                    496e5f2c95cbe3c7c2305a30556f782749c72d1c

                                    SHA256

                                    d2d2f401ac9473c5c760f9d178294cca3918b0de4c41e98319121bc2a3bcc239

                                    SHA512

                                    ba427a02328c2c92a5da23d48d9babbd63da9a610c5fffd42252f72a2199efaee230dec7c0fb88542c5bc322151cfd377467e48448bff965a48266f89c984eb2

                                  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    617bfcf34d51647b3e1177684d100d96

                                    SHA1

                                    496e5f2c95cbe3c7c2305a30556f782749c72d1c

                                    SHA256

                                    d2d2f401ac9473c5c760f9d178294cca3918b0de4c41e98319121bc2a3bcc239

                                    SHA512

                                    ba427a02328c2c92a5da23d48d9babbd63da9a610c5fffd42252f72a2199efaee230dec7c0fb88542c5bc322151cfd377467e48448bff965a48266f89c984eb2

                                  • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Users\Admin\Pictures\7iufLYWWaZ9awLMVFF2IBDY1.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Users\Admin\Pictures\LNhEWU6OmmTYkiOLpluuhrBG.exe

                                    Filesize

                                    212B

                                    MD5

                                    963da09532e9758adedf9745c76ec700

                                    SHA1

                                    bc976476358cffdbc3f22b6e491f94ccbf15308d

                                    SHA256

                                    8720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2

                                    SHA512

                                    2da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6

                                  • C:\Users\Admin\Pictures\NYTzCBZjsqecAwLqE3Fmi2tp.exe

                                    Filesize

                                    196KB

                                    MD5

                                    7db2bea896bebb4c12f76dd13a022322

                                    SHA1

                                    8d57c2737b7fc6eca672ed20d48c5f15cfa05b0d

                                    SHA256

                                    c8f293836cef476c93dc309e6a0a8311d73f36dabc35b44e1b257de5a1b57202

                                    SHA512

                                    6f5ee6589d2d99682c45d012e0390760b31a02c9f9c37acb281073c61c77dfb8199156c0893ecf45029d929d515d457b3cc099e73bd0b6983d12a5b9c522087c

                                  • C:\Users\Admin\Pictures\NYTzCBZjsqecAwLqE3Fmi2tp.exe

                                    Filesize

                                    196KB

                                    MD5

                                    7db2bea896bebb4c12f76dd13a022322

                                    SHA1

                                    8d57c2737b7fc6eca672ed20d48c5f15cfa05b0d

                                    SHA256

                                    c8f293836cef476c93dc309e6a0a8311d73f36dabc35b44e1b257de5a1b57202

                                    SHA512

                                    6f5ee6589d2d99682c45d012e0390760b31a02c9f9c37acb281073c61c77dfb8199156c0893ecf45029d929d515d457b3cc099e73bd0b6983d12a5b9c522087c

                                  • C:\Users\Admin\Pictures\NYTzCBZjsqecAwLqE3Fmi2tp.exe

                                    Filesize

                                    196KB

                                    MD5

                                    7db2bea896bebb4c12f76dd13a022322

                                    SHA1

                                    8d57c2737b7fc6eca672ed20d48c5f15cfa05b0d

                                    SHA256

                                    c8f293836cef476c93dc309e6a0a8311d73f36dabc35b44e1b257de5a1b57202

                                    SHA512

                                    6f5ee6589d2d99682c45d012e0390760b31a02c9f9c37acb281073c61c77dfb8199156c0893ecf45029d929d515d457b3cc099e73bd0b6983d12a5b9c522087c

                                  • C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe

                                    Filesize

                                    3.3MB

                                    MD5

                                    f98fc5da23c9c70cf74177ffdfa5cdb4

                                    SHA1

                                    ca7e73009113f92391f514f97206f2677ea0d797

                                    SHA256

                                    fed17573dc7d45708ffbeb07a6e1d87e7918fc99c6c2a3d512d72e3556e9f76b

                                    SHA512

                                    cd2c065833aaeab1a30be552f8ca798ce0c9749afd83192525a3d27997541a8b26e63f1ec33f06b5e1bbf2eaa67c18ebe96b8596d2523f3137881911caa07e8a

                                  • C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe

                                    Filesize

                                    3.3MB

                                    MD5

                                    f98fc5da23c9c70cf74177ffdfa5cdb4

                                    SHA1

                                    ca7e73009113f92391f514f97206f2677ea0d797

                                    SHA256

                                    fed17573dc7d45708ffbeb07a6e1d87e7918fc99c6c2a3d512d72e3556e9f76b

                                    SHA512

                                    cd2c065833aaeab1a30be552f8ca798ce0c9749afd83192525a3d27997541a8b26e63f1ec33f06b5e1bbf2eaa67c18ebe96b8596d2523f3137881911caa07e8a

                                  • C:\Users\Admin\Pictures\Vo4ockirxs7DPYbPscJ15FFq.exe

                                    Filesize

                                    3.3MB

                                    MD5

                                    f98fc5da23c9c70cf74177ffdfa5cdb4

                                    SHA1

                                    ca7e73009113f92391f514f97206f2677ea0d797

                                    SHA256

                                    fed17573dc7d45708ffbeb07a6e1d87e7918fc99c6c2a3d512d72e3556e9f76b

                                    SHA512

                                    cd2c065833aaeab1a30be552f8ca798ce0c9749afd83192525a3d27997541a8b26e63f1ec33f06b5e1bbf2eaa67c18ebe96b8596d2523f3137881911caa07e8a

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\WIgH9EJ0lY733XYr7bR79vMm.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    b616ed21861ce298343b1ef78d38a600

                                    SHA1

                                    9dd4cfa219f87b6ad51be7cbbc7e80af91b3bcbe

                                    SHA256

                                    a710d3af2ce6948fe5c94fe10a7c44e5f5003a2e441cbb0a964dee9a1eccf859

                                    SHA512

                                    4b5bbecc01dd22fb309931a29e6d447c19cf3c4e4529988497e4dd7fd34ba62448930fde0a256cda9fc519c8a94145a2df6b4fdfd89b2284ef265118b7d529bf

                                  • C:\Users\Admin\Pictures\Zti3zCTi94E735zxrLrKOC7S.exe

                                    Filesize

                                    334KB

                                    MD5

                                    b2f9c8c1367bb5a64232dd815c5158d9

                                    SHA1

                                    f9419c4474e46b2348166798e55d6c4cd3a738b7

                                    SHA256

                                    543d0a85398762fdf5d155fb14833257aa09fcc86da9e789dffbbdd29ff2240f

                                    SHA512

                                    120692d6266e1850f28df72dc534a6fb427c23bd3317eaf63c11cbccc09075ea6e32df30fe1586d92b0af4b00ba3280c32cd5a1eb6d4ce67170b5ffa8dd003f3

                                  • C:\Users\Admin\Pictures\Zti3zCTi94E735zxrLrKOC7S.exe

                                    Filesize

                                    334KB

                                    MD5

                                    b2f9c8c1367bb5a64232dd815c5158d9

                                    SHA1

                                    f9419c4474e46b2348166798e55d6c4cd3a738b7

                                    SHA256

                                    543d0a85398762fdf5d155fb14833257aa09fcc86da9e789dffbbdd29ff2240f

                                    SHA512

                                    120692d6266e1850f28df72dc534a6fb427c23bd3317eaf63c11cbccc09075ea6e32df30fe1586d92b0af4b00ba3280c32cd5a1eb6d4ce67170b5ffa8dd003f3

                                  • C:\Users\Admin\Pictures\Zti3zCTi94E735zxrLrKOC7S.exe

                                    Filesize

                                    334KB

                                    MD5

                                    b2f9c8c1367bb5a64232dd815c5158d9

                                    SHA1

                                    f9419c4474e46b2348166798e55d6c4cd3a738b7

                                    SHA256

                                    543d0a85398762fdf5d155fb14833257aa09fcc86da9e789dffbbdd29ff2240f

                                    SHA512

                                    120692d6266e1850f28df72dc534a6fb427c23bd3317eaf63c11cbccc09075ea6e32df30fe1586d92b0af4b00ba3280c32cd5a1eb6d4ce67170b5ffa8dd003f3

                                  • C:\Users\Admin\Pictures\jdwZajcq8cUHu4Cliyt6PvAk.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    9873907d252dcecd6baea9a11ac4b0da

                                    SHA1

                                    102562c75d3dbb2c9b2922674f83c5f0f36e3d0c

                                    SHA256

                                    a5c68511132b9590f0d60bc6fa5f43999c25d636d0b29aae1ff3787688907fe7

                                    SHA512

                                    2054607e09f31d65060a8b8205755f785b5ea0be9b248977b00fa95ed2938313309876d91b7fef5d33866024cf52cf0dd7a73336e703e035770e24b506db19c8

                                  • C:\Users\Admin\Pictures\jdwZajcq8cUHu4Cliyt6PvAk.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    9873907d252dcecd6baea9a11ac4b0da

                                    SHA1

                                    102562c75d3dbb2c9b2922674f83c5f0f36e3d0c

                                    SHA256

                                    a5c68511132b9590f0d60bc6fa5f43999c25d636d0b29aae1ff3787688907fe7

                                    SHA512

                                    2054607e09f31d65060a8b8205755f785b5ea0be9b248977b00fa95ed2938313309876d91b7fef5d33866024cf52cf0dd7a73336e703e035770e24b506db19c8

                                  • C:\Users\Admin\Pictures\jdwZajcq8cUHu4Cliyt6PvAk.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    9873907d252dcecd6baea9a11ac4b0da

                                    SHA1

                                    102562c75d3dbb2c9b2922674f83c5f0f36e3d0c

                                    SHA256

                                    a5c68511132b9590f0d60bc6fa5f43999c25d636d0b29aae1ff3787688907fe7

                                    SHA512

                                    2054607e09f31d65060a8b8205755f785b5ea0be9b248977b00fa95ed2938313309876d91b7fef5d33866024cf52cf0dd7a73336e703e035770e24b506db19c8

                                  • C:\Users\Admin\Pictures\m0Ky1ZovOeYjny1mdFPv8l0K.exe

                                    Filesize

                                    2.3MB

                                    MD5

                                    c5e0976f33cd1d6249a860edcd5ffba5

                                    SHA1

                                    7ea8f38a2e4e035349cd472d1fdc05661077f013

                                    SHA256

                                    581ae17196916b4ada711c0a43cd0e1fb88376d37f97c4a8b7a115502b88c4e8

                                    SHA512

                                    086727c950dd7735a82d2fa4b4899e6f0b6962e39d494e529ddd7d3de6b49065be67ec26f348ade24b4d76f5d4efc1f3ceb5e6e39aeaebe43a419ba71b08b176

                                  • C:\Users\Admin\Pictures\m0Ky1ZovOeYjny1mdFPv8l0K.exe

                                    Filesize

                                    2.3MB

                                    MD5

                                    c5e0976f33cd1d6249a860edcd5ffba5

                                    SHA1

                                    7ea8f38a2e4e035349cd472d1fdc05661077f013

                                    SHA256

                                    581ae17196916b4ada711c0a43cd0e1fb88376d37f97c4a8b7a115502b88c4e8

                                    SHA512

                                    086727c950dd7735a82d2fa4b4899e6f0b6962e39d494e529ddd7d3de6b49065be67ec26f348ade24b4d76f5d4efc1f3ceb5e6e39aeaebe43a419ba71b08b176

                                  • C:\Users\Admin\Pictures\m0Ky1ZovOeYjny1mdFPv8l0K.exe

                                    Filesize

                                    2.3MB

                                    MD5

                                    c5e0976f33cd1d6249a860edcd5ffba5

                                    SHA1

                                    7ea8f38a2e4e035349cd472d1fdc05661077f013

                                    SHA256

                                    581ae17196916b4ada711c0a43cd0e1fb88376d37f97c4a8b7a115502b88c4e8

                                    SHA512

                                    086727c950dd7735a82d2fa4b4899e6f0b6962e39d494e529ddd7d3de6b49065be67ec26f348ade24b4d76f5d4efc1f3ceb5e6e39aeaebe43a419ba71b08b176

                                  • C:\Users\Admin\Pictures\naDWTwa0VQg5DeU0ikIjKOhu.exe

                                    Filesize

                                    7KB

                                    MD5

                                    5b423612b36cde7f2745455c5dd82577

                                    SHA1

                                    0187c7c80743b44e9e0c193e993294e3b969cc3d

                                    SHA256

                                    e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                    SHA512

                                    c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    3d086a433708053f9bf9523e1d87a4e8

                                    SHA1

                                    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                    SHA256

                                    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                    SHA512

                                    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                    Filesize

                                    19KB

                                    MD5

                                    dfff89f2bbafa8eabe7abda5a6c370b4

                                    SHA1

                                    e2ee4287b2c87097a3b6aca332d875f785ebc051

                                    SHA256

                                    8b05b7a69dad2700d73a169f26e0a9ffd1a223d0715bbeafd9b0c77f695e8b5f

                                    SHA512

                                    b8e393cc606f7f6932409bfcb2106bbea001fedcc96de0ed44de10e032f530d724844ecc4a01b1241a6197fb16fa9c9a875ed75984d6d1bc8348ab569051dcd0

                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                    Filesize

                                    19KB

                                    MD5

                                    c7ea62c289c705e4f8ec929720c13fe5

                                    SHA1

                                    1b81a4f978e5879a2a400036edd90261220bded3

                                    SHA256

                                    727fad6c1fd61ce010d23a50016412acf4b1163445680a4a2a5df07f57d3c6fe

                                    SHA512

                                    9493327ff3b0ca122fa57a6372f899fbb193502debe6c0f425bff6212321e47c3a70c02e51c9a11ba473ce2af00f7675ef7850637f65489f728e55da58b520d2

                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                    Filesize

                                    19KB

                                    MD5

                                    b97c41b803674113102e215af62f02f3

                                    SHA1

                                    33cb98575d34b5b4b2a13d0be0e086e173ff7e7c

                                    SHA256

                                    b161cd24ad6d6adf6fda2a4f58f38b607f6d377ef42a9573512e98a166313e12

                                    SHA512

                                    3b5cff41d990f4d414cdb653dcbae5026e45c9ca28a5498b06f6b56c9894759d4f64179fcabd39e7e14089376c773a7b7ff9f56e076e4275cbcf428d16d9e90d

                                  • C:\Windows\System32\drivers\etc\hosts

                                    Filesize

                                    3KB

                                    MD5

                                    00930b40cba79465b7a38ed0449d1449

                                    SHA1

                                    4b25a89ee28b20ba162f23772ddaf017669092a5

                                    SHA256

                                    eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                    SHA512

                                    cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                  • C:\Windows\TEMP\tlxvacrdjkek.xml

                                    Filesize

                                    1KB

                                    MD5

                                    546d67a48ff2bf7682cea9fac07b942e

                                    SHA1

                                    a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                                    SHA256

                                    eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                                    SHA512

                                    10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

                                  • C:\Windows\rss\csrss.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Windows\rss\csrss.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    d373ff7cb6ac28b844d9c90fc8f1ab3f

                                    SHA1

                                    8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                    SHA256

                                    92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                    SHA512

                                    f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                  • C:\Windows\system32\drivers\etc\hosts

                                    Filesize

                                    3KB

                                    MD5

                                    00930b40cba79465b7a38ed0449d1449

                                    SHA1

                                    4b25a89ee28b20ba162f23772ddaf017669092a5

                                    SHA256

                                    eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                    SHA512

                                    cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                  • memory/64-166-0x0000000000600000-0x0000000000601000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/64-295-0x0000000000400000-0x00000000004BD000-memory.dmp

                                    Filesize

                                    756KB

                                  • memory/920-356-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/920-428-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/920-373-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/920-354-0x0000000002DE0000-0x00000000036CB000-memory.dmp

                                    Filesize

                                    8.9MB

                                  • memory/920-405-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/920-350-0x00000000029D0000-0x0000000002DD7000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/920-336-0x000000006E9E0000-0x000000006E9ED000-memory.dmp

                                    Filesize

                                    52KB

                                  • memory/920-332-0x000000006D040000-0x000000006D07F000-memory.dmp

                                    Filesize

                                    252KB

                                  • memory/920-330-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1316-226-0x0000000000730000-0x0000000000C58000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/1564-239-0x00000000003F0000-0x0000000000918000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/1604-339-0x00007FFCC0C60000-0x00007FFCC1721000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1604-312-0x000001ABF29B0000-0x000001ABF29D2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/1604-327-0x00007FFCC0C60000-0x00007FFCC1721000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1948-341-0x00007FF79CAC0000-0x00007FF79D003000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/1948-307-0x00007FF79CAC0000-0x00007FF79D003000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/1948-370-0x00007FF79CAC0000-0x00007FF79D003000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/1948-281-0x00007FF79CAC0000-0x00007FF79D003000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/2336-146-0x00000000003F0000-0x0000000000918000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/2620-414-0x00007FF6DD750000-0x00007FF6DDC93000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/2672-246-0x00000000003F0000-0x0000000000918000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/2760-380-0x0000000002B40000-0x0000000002B50000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2760-379-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3852-168-0x00000000003F0000-0x0000000000918000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/3852-296-0x00000000003F0000-0x0000000000918000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/4172-105-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4172-279-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4232-254-0x0000000000B40000-0x0000000000C40000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/4232-302-0x0000000000400000-0x00000000007DC000-memory.dmp

                                    Filesize

                                    3.9MB

                                  • memory/4232-250-0x0000000000930000-0x0000000000967000-memory.dmp

                                    Filesize

                                    220KB

                                  • memory/4232-251-0x0000000000400000-0x00000000007DC000-memory.dmp

                                    Filesize

                                    3.9MB

                                  • memory/4320-234-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/4320-15-0x0000000005650000-0x0000000005660000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4320-13-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/4320-243-0x0000000005650000-0x0000000005660000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4320-11-0x0000000000400000-0x0000000000408000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4728-311-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4728-406-0x0000000000400000-0x0000000000965000-memory.dmp

                                    Filesize

                                    5.4MB

                                  • memory/4728-152-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4728-284-0x0000000000400000-0x0000000000965000-memory.dmp

                                    Filesize

                                    5.4MB

                                  • memory/4884-396-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4884-347-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4884-353-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4884-422-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4884-305-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4884-241-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4948-6-0x0000000004E10000-0x0000000004E20000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4948-1-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/4948-0-0x0000000000040000-0x0000000000242000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4948-10-0x0000000008000000-0x000000000801A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/4948-2-0x0000000005130000-0x00000000056D4000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/4948-3-0x0000000004C30000-0x0000000004CC2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4948-9-0x0000000005FC0000-0x0000000006172000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/4948-8-0x0000000005E40000-0x0000000005E5E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/4948-4-0x0000000004E10000-0x0000000004E20000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4948-5-0x0000000004DE0000-0x0000000004DEA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4948-14-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/4948-7-0x0000000008020000-0x0000000008096000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/4956-218-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4956-221-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4956-227-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/4956-216-0x0000000000400000-0x00000000006ED000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/5016-299-0x0000000007190000-0x00000000071AA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/5016-378-0x00000000074B0000-0x00000000074C4000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/5016-253-0x0000000004880000-0x0000000004890000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5016-252-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/5016-20-0x0000000004EC0000-0x00000000054E8000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/5016-16-0x0000000004810000-0x0000000004846000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/5016-278-0x0000000006450000-0x0000000006482000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/5016-17-0x0000000074AD0000-0x0000000075280000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/5016-280-0x000000006E380000-0x000000006E3CC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/5016-292-0x0000000006430000-0x000000000644E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/5016-294-0x0000000006E80000-0x0000000006F23000-memory.dmp

                                    Filesize

                                    652KB

                                  • memory/5016-18-0x0000000004880000-0x0000000004890000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5016-297-0x000000007F1F0000-0x000000007F200000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5016-255-0x0000000004880000-0x0000000004890000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5016-377-0x00000000073F0000-0x00000000073FE000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/5016-21-0x0000000005690000-0x00000000056B2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/5016-40-0x00000000057A0000-0x0000000005806000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/5016-298-0x00000000077D0000-0x0000000007E4A000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/5016-300-0x0000000007210000-0x000000000721A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/5016-301-0x0000000007410000-0x00000000074A6000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/5016-39-0x0000000005730000-0x0000000005796000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/5016-19-0x0000000004880000-0x0000000004890000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5016-324-0x00000000073B0000-0x00000000073C1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/5016-170-0x0000000006380000-0x00000000063CC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/5016-167-0x0000000005E10000-0x0000000005E2E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/5016-101-0x00000000059A0000-0x0000000005CF4000-memory.dmp

                                    Filesize

                                    3.3MB