Resubmissions

04-02-2024 20:53

240204-zppqysaee3 10

18-12-2023 05:04

231218-fqrgdsaeh8 10

Analysis

  • max time kernel
    299s
  • max time network
    290s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-12-2023 05:04

General

  • Target

    ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe

  • Size

    735KB

  • MD5

    9f5cb3a9a4053a53063a9da9afbf6273

  • SHA1

    b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e

  • SHA256

    ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1

  • SHA512

    aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26

  • SSDEEP

    12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 12 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 11 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
    "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2808
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe
        "C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp" /SL5="$10005A,6584009,54272,C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of FindShellTrayWindow
          PID:2804
      • C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe
        "C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe"
        3⤵
          PID:2660
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious behavior: EnumeratesProcesses
            PID:3844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 516
              5⤵
              • Program crash
              PID:4636
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 532
              5⤵
              • Program crash
              PID:192
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:1672
              • C:\Windows\System32\Conhost.exe
                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2660
          • C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe
            "C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"
            3⤵
              PID:4952
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3568
              • C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe
                "C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:780
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:828
                • C:\Windows\System32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                    PID:3824
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4752
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1284
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:236
              • C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe
                "C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2612
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3232
                • C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe
                  "C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"
                  4⤵
                  • Windows security bypass
                  • Executes dropped EXE
                  • Windows security modification
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3532
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                      PID:2880
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      5⤵
                        PID:4380
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          6⤵
                          • Modifies Windows Firewall
                          PID:4340
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                          PID:1672
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            6⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2880
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                            PID:932
                          • C:\Windows\rss\csrss.exe
                            C:\Windows\rss\csrss.exe
                            5⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Manipulates WinMonFS driver.
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4952
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1672
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4408
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /delete /tn ScheduledUpdate /f
                              6⤵
                                PID:3332
                              • C:\Windows\SYSTEM32\schtasks.exe
                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                6⤵
                                • Drops file in System32 directory
                                • Creates scheduled task(s)
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:932
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                6⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3888
                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                6⤵
                                • Executes dropped EXE
                                PID:1968
                              • C:\Windows\SYSTEM32\schtasks.exe
                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                6⤵
                                • Creates scheduled task(s)
                                PID:1116
                              • C:\Windows\windefender.exe
                                "C:\Windows\windefender.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:2160
                        • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe
                          "C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe" --silent --allusers=0
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          • Modifies system certificate store
                          • Suspicious use of WriteProcessMemory
                          PID:1756
                          • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe
                            C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2bc,0x2c0,0x2c4,0x298,0x2c8,0x6e317518,0x6e317528,0x6e317534
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:2428
                          • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe
                            "C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1756 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231218050505" --session-guid=0e1cf6ce-1680-452b-98d6-a59dce814e00 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=5804000000000000
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates connected drives
                            • Suspicious use of WriteProcessMemory
                            PID:3220
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cB5PL1P9sAZgyvnqJabdlfvg.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cB5PL1P9sAZgyvnqJabdlfvg.exe" --version
                            4⤵
                              PID:4008
                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
                              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:2456
                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe
                              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe" --version
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:4200
                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe
                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x248,0x24c,0x250,0x11c,0x258,0x501588,0x501598,0x5015a4
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1416
                          • C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe
                            "C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Registers COM server for autorun
                            • Drops file in Program Files directory
                            • Drops file in Windows directory
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1888
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                          2⤵
                            PID:4156
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3032
                        • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe
                          C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2b4,0x2b8,0x2c8,0x290,0x2cc,0x6d637518,0x6d637528,0x6d637534
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:1524
                        • c:\windows\system32\sihost.exe
                          sihost.exe
                          1⤵
                            PID:2928
                            • C:\Windows\SysWOW64\dialer.exe
                              "C:\Windows\system32\dialer.exe"
                              2⤵
                                PID:1808
                            • \??\c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:4008
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              1⤵
                                PID:4380
                              • C:\Windows\System32\Conhost.exe
                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                1⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1808
                              • C:\Windows\windefender.exe
                                C:\Windows\windefender.exe
                                1⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                PID:2560
                              • C:\Windows\SysWOW64\sc.exe
                                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                1⤵
                                • Launches sc.exe
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4828
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                1⤵
                                  PID:4256

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files (x86)\ClocX\uninst.exe

                                  Filesize

                                  51KB

                                  MD5

                                  26ed02c53c9aea71002b6370e79606ed

                                  SHA1

                                  f20f691e855c32d94558fc03faef677dbbd1417e

                                  SHA256

                                  4daa1ba1df72179a094f039835c3d0c9b246bf70807dfb3c0ba514e6da2795a7

                                  SHA512

                                  b25d761d9e18fb973dfa9e608e2d44ab5046c3e978a7540ea673575a2d7db90906db8c2c5f93dcbdc5a38b02eca48e1f33d9a2ef48003dbbf4619d6f11e24bbe

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  1c19c16e21c97ed42d5beabc93391fc5

                                  SHA1

                                  8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                  SHA256

                                  1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                  SHA512

                                  7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  d17d743f063477dbce463168a596154f

                                  SHA1

                                  470a2a556d3b90f1d54e4f81c588893b3d6df614

                                  SHA256

                                  eea580bb6dcd90fd8afaeaf9f726dc29221d38b3f8186171704769ce4329fa8a

                                  SHA512

                                  6bc0f03fa59c57db77f9c99c1c5501476f802a1ab4056cc9d0348c7cfb725ec9dff4ad29900412f2e77ca1e727741c19bed4f32ad9d9d8ab86436b7c22a34942

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  10KB

                                  MD5

                                  bd84419891bd8bb6cf4223a142819429

                                  SHA1

                                  eebcbde45d2f1aa0db104deeac7d9e23ade7e0f4

                                  SHA256

                                  ffb2618d57436d2d4b1fae98a52df59575014e52cf55b8de6853f948634e1731

                                  SHA512

                                  207fe89d00f40c424881e109606810f07bae35674349a68bc420b3cf424661f815b8b0844f48ce0cbf27385801f071c6cbe98a2f6de1efd63fd506f2b5a50da5

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\additional_file0.tmp

                                  Filesize

                                  63KB

                                  MD5

                                  d76e7d42b4e144a791142a13a2aa6265

                                  SHA1

                                  7f26cf7acff0fe688fd291eec3d8c6f742d41293

                                  SHA256

                                  426e3a53165b37104ee8a4aac86d6909e079b68322967d275553800252f2a52b

                                  SHA512

                                  2c93ab20d16f6b1d20b0f2712f7b1f57518f995ac57e2c9c7e38dca09f1b8ad01a441e0ec35214b27092a7b3fa4c1ab31c6959cf8d6cfeca2d980469f228f9c0

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                  Filesize

                                  42KB

                                  MD5

                                  15dc8b8d2e03222ee0425ad3472bbb58

                                  SHA1

                                  d98050b1ece9912797eb893a060ce616d6b2e0eb

                                  SHA256

                                  59be298d19c05ddb3a9020555ea67360e1c6b92397c965eb01b11ee9ec3212c8

                                  SHA512

                                  32e8c121f43a863f8929b7e1ddcdb98b3f6d756c56b0c674747c9944984a2a6e2dd8e0ebe46a914c6ad3d82db86e7f3ff7a786848d8ba0ca3716475af67ff24b

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                  Filesize

                                  68KB

                                  MD5

                                  72feaec13ff24263517588860dfb48d9

                                  SHA1

                                  1a6ddfc6f40b4216aaa56b470c6b42306c24535c

                                  SHA256

                                  cf2a8e9a27e663156366083f6b53b644b24a8c547f7b3ae6643beb45e6f55f57

                                  SHA512

                                  100636d581aa606597e28c5fe71a8647b62914ad01408be9ac4f0e7c1941b01fa0bf54a9f47eecc91daed14ddf3adad03575ae696eb05098d01c39f762ee9fb1

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe

                                  Filesize

                                  94KB

                                  MD5

                                  162cba9910401be300632c7494e2d022

                                  SHA1

                                  c71bfbe3da6a188806c1b955fea8e70ade74ada0

                                  SHA256

                                  b027416d74fb1f07859ee1dad55cf9e3004e09525e94ce25ad5dbbd494d8e98d

                                  SHA512

                                  15a0ae3ba8712471fd320e74c071118337bdbeb081bdf7d56b26dec2a5751a3ba4a907ee711ec16f434041c0ce1e1ae22c666d25f9374c0a12bcd4414e8d2645

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe

                                  Filesize

                                  20KB

                                  MD5

                                  1ebee8fe81de15e50ecf8f845e5a6fe0

                                  SHA1

                                  4b530145a1fc66740b9e8949ce1e5559258caacf

                                  SHA256

                                  74f86230266a9cd0df2fae49591c66c33479453ad0eda9a023530bcb533830c0

                                  SHA512

                                  49aaf3279ff9a3bc5e79cd356c8b85fa19595b9fd6c3722ada8170e371461b26479e61a6371ec455c4a0a781b90f90ad0569ac408e24fda616840427808b067f

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.DLL

                                  Filesize

                                  130KB

                                  MD5

                                  eab95512328d7880651ce6602ddfe474

                                  SHA1

                                  083e1ea8a362c35ddcf16017dea33e6248b2358a

                                  SHA256

                                  9cfeeb7bc8b401c8ed7329f7f131d29269c7dd6507d30a0621ec1ba66e855256

                                  SHA512

                                  98eec95d20e478b2a7fc196cc66c0c35db910c29ecf287a5806d6e2d9f8537f08a1d70d7135dd2bb58467e681b7edf13999f527677276dd05f6d2bc85aa5ac02

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll

                                  Filesize

                                  68KB

                                  MD5

                                  358b924bd93f2503f718a6c781f767b9

                                  SHA1

                                  adb3c7c007e3632914caae9a30d951180d6b7b7b

                                  SHA256

                                  f91b4d2d8b0510cbb926b8d589e55478669a5e3c2b5881aa2ece8693f3daec9b

                                  SHA512

                                  9a7c42f5f121e00cb404c66aa80b10286ae2fa6853b567c330fe64450a36aa6b8efc535c5e17e5115de8529c90e88c9a68d79e0f6a41e130d00450e6f7fb0e7b

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\opera_package

                                  Filesize

                                  103KB

                                  MD5

                                  f9dcd3966165b871e3aeb7d8f7c148fa

                                  SHA1

                                  7611c26c7b29733f91c756eb49dcf45d9d1ce7f5

                                  SHA256

                                  a6185972857cee7f850b97877bf7ab78f49a75c4b123b4d9c509b3c636c7a8be

                                  SHA512

                                  1fdaf81a85ca14d80b5372226903b5566140cca13e657c07c9f7b32f0fac4abb3fa3852f8adb3c6e938b501c6ef39c830488e6b98e7495f8d8248c64424b79b5

                                • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2312180505053864008.dll

                                  Filesize

                                  71KB

                                  MD5

                                  27d611a750255c3841199aeaca9adfc5

                                  SHA1

                                  b464ed63dc2eddba46d3933e3222cd4988fff86a

                                  SHA256

                                  be2a0f7d8991abf9c948b9f89610cdd72f2363a43f9785c3df80fe4033ea540c

                                  SHA512

                                  fd2fc04f9a3e287d74e973970f845face2b8c60fb54b677a79edfb1e676f91dcd87dd380e1ad24118c262143e45fe8726d2a1341a8b9fa7c85a545f58cba19d6

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gln4cehp.fqs.ps1

                                  Filesize

                                  1B

                                  MD5

                                  c4ca4238a0b923820dcc509a6f75849b

                                  SHA1

                                  356a192b7913b04c54574d18c28d46e6395428ab

                                  SHA256

                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                  SHA512

                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                  Filesize

                                  1KB

                                  MD5

                                  354e9fef8093169ab558b3f20c4bf81a

                                  SHA1

                                  b2293505f7519daa90aecd20a1e3b236f74be983

                                  SHA256

                                  ef8aab456cd4812c46735b308aa6e30d679289b8f2859c0afd0e9118c180f7a5

                                  SHA512

                                  9c26b8026958b65233a568675bd0eb4ca589289200fd198eb15f574bf69273212eff684011bfb048a3af659fdf7395871e1b6666e36e83b471f67335d5ba5b27

                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                  Filesize

                                  22KB

                                  MD5

                                  a98985a020141162b4459fbbc72aedf2

                                  SHA1

                                  842406cbcc2a39c0786c83e851af955447c46a4b

                                  SHA256

                                  bba612af01e22477267509ecaedef1779dac3b9a6a8c3a10d39f47525de694ad

                                  SHA512

                                  a28b18151f26e7348319de0fa5233cd244b3c7c9a0edb11a8f72c1ce0393547c1579afeecd3a897d15f357689143fa2c42afc1e38f6de6a270a9a22ab91148fb

                                • C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp

                                  Filesize

                                  36KB

                                  MD5

                                  698f31949199e67070505364e2359dae

                                  SHA1

                                  c090670972072ae39dbaf21fed19fd4bd008b734

                                  SHA256

                                  91049e640dfb16a9f39ea812eb1207ce62e7aebee7f56aebe97703a4fabe2003

                                  SHA512

                                  6f1aa5d763d37526d6af27eb282d54c9dbe6805a8e06f418913aabb1879ea36132d07871463f622739ff028dd33a82997b9707b532f4036c8b610a48438a0ac5

                                • C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp

                                  Filesize

                                  40KB

                                  MD5

                                  5b659242190d7b6caf7b9230c29a37ee

                                  SHA1

                                  5bf08969f0c46a857464ad14a4a63a0e9b1ea327

                                  SHA256

                                  10296efb4ae07f041aa01a78f30d9e71ef7a1270cf378fb099ce2c33d7c1170a

                                  SHA512

                                  3920ff8ba52c16be431f52269fcc396456535d3f7a3db8734e41585aead0a6be48e3920123c07e59c7e089aa671974e3224abd8a4e3616736bc361a1cc1cd969

                                • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\Checker.dll

                                  Filesize

                                  9KB

                                  MD5

                                  0387d5ab46a51e2369a26c7d9f0672ad

                                  SHA1

                                  93d79add8006e868deee7bf5cd9be62f6c005e80

                                  SHA256

                                  cc128601b6502106ea8c7d1c4fcdbc6f0564ee32a8b02171fd28eedd4f9ffe01

                                  SHA512

                                  523ec62545257162824844fe49d9a76130b6342ecbb4d3d606119a105b4c80c0a1821631f1e97607aedf8f85357f99db153d0918e3448c4edd31aec89a23c0af

                                • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\Zip.dll

                                  Filesize

                                  5KB

                                  MD5

                                  82e5c5073b162327842755e3baae2a98

                                  SHA1

                                  39eaaee6e9563c5b396184ac70657e440fc5a681

                                  SHA256

                                  11e008afb9be25b25c376ecf3a6369465de230c758802813a219cf7bb51f5994

                                  SHA512

                                  93584b918a0470a9197afbb7cbadfe39f3a8e1e25ce875511f621026c6e13e32f26dff90db492175a9dbf640b77f18d931e450d29fb961a19232148c2288bed5

                                • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                  Filesize

                                  40B

                                  MD5

                                  76bdb2a85fb457e433acd8a0e575e548

                                  SHA1

                                  b0743514f737036a160d9c82a8a021006766e9be

                                  SHA256

                                  3bd9e40a72f27ed7f674416d1af3ad84e2f5d25eca91cb40d96bed4fa1d125de

                                  SHA512

                                  ba455829f6f9b6fbee6a9d586d828ae6601dfed23254b331d4c93fc306678fd4b803eb3ed253b647ad957c658373f7fb37b2b15d5fb7a7e77d818102ac218622

                                • C:\Users\Admin\Pictures\BeqftuhSsPkCheluoFzGiYOr.exe

                                  Filesize

                                  212B

                                  MD5

                                  963da09532e9758adedf9745c76ec700

                                  SHA1

                                  bc976476358cffdbc3f22b6e491f94ccbf15308d

                                  SHA256

                                  8720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2

                                  SHA512

                                  2da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6

                                • C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe

                                  Filesize

                                  2KB

                                  MD5

                                  eb5b893e8b04ac6458a46a29539233c3

                                  SHA1

                                  d784663fd2653872b68cf5d7adf56eae3be64178

                                  SHA256

                                  a15ce6a390079dc8881b736ba6e6f767fee44db2711781cbacf00342e7cc5076

                                  SHA512

                                  6c29d72bf38f37c824b842f72f78898037a2b881645c9cb6a9d29289c7dbbdb41f3588f5d432083bb1d1e16b3cdc316a671d296de33c8fcb121a7f5e9d3d06e6

                                • C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe

                                  Filesize

                                  32KB

                                  MD5

                                  7456888caadf8577180bd11deee1d8f5

                                  SHA1

                                  4e697fe472667e7c4a000d9189cd5dcaa9d660ad

                                  SHA256

                                  14cfe90d9ad8cebbaa7d6e9678545ebfa1ebc127285af640bd8ece36be8886c7

                                  SHA512

                                  a5fb48fe7b82b18fcecb266fb319e9726841241b18dfde65c9c613be93dd61d42d04a578a1b003158486cde7b4cbc271b111fc636eddfa272e54864707936813

                                • C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe

                                  Filesize

                                  118KB

                                  MD5

                                  ec03f87d49dcc25276d2e537dffe05c6

                                  SHA1

                                  ca111b861680a198ae443cda9b52f45c2c7d67ac

                                  SHA256

                                  3177bbe48d0e31bde70ed0e4fb1ad41bff12246a0c1dcffdfd47d9deed317c98

                                  SHA512

                                  b0e48f825c27ea81aa17fe887f584570a3c84adc7b8824ce6366525074ab162056734c2059b2103db24a3b28c2cb39b255da3e6df1ccdfee431cf4703be483a5

                                • C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe

                                  Filesize

                                  4KB

                                  MD5

                                  8c263240d9878741cf947c973cdbeeb7

                                  SHA1

                                  4c6c48fab4a685676bb06a3e0dd2d435f50ba0b2

                                  SHA256

                                  f0ba5b219657ada6efd45bc6aeae51ff85f0c18d1179e3910bbc55a31f2ac576

                                  SHA512

                                  c1b257de9ab2cdab63ab993e37fe5b6a2be8e4488864a7a7e0b002517bf1e96351a2b62033d30afd3b9ab69fb28354295ab9ebf281cd0eee72099a098648d395

                                • C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe

                                  Filesize

                                  1KB

                                  MD5

                                  4ada9939c5bf68652dd8757436da27ec

                                  SHA1

                                  9b19b5ef422dc09ba035c995d39872b25e419795

                                  SHA256

                                  346e3179c241aa5a09aa57bef4fffe72fbad29eb2be6cde4da142c9c7c0031f5

                                  SHA512

                                  b8bfbf0a0e9b8421d6050b896484912506f38953ece6632b1b9bfee27b303c8c2f762472bc7a79501932683811424625ad8ffc6f4ec415093f031d71d6964ffb

                                • C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe

                                  Filesize

                                  88KB

                                  MD5

                                  e176fbe8ac3cc5e515a26fa68ac8c904

                                  SHA1

                                  bcd5d145cb3b8baa3fe382537c025e5b09d248f4

                                  SHA256

                                  533f806f1920f24571d004ed15e75cc5e9978726905dd7b065ff81e0cbb1f8bc

                                  SHA512

                                  cb3668451f9c4f1791baddc47d28880158c661221318f5f076d5188b67ef95cba3d23b7ddc7be59704d64f67b0f7034fb8b99830b3494e0bb6048254cca9f2ca

                                • C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe

                                  Filesize

                                  128KB

                                  MD5

                                  026b42a06109f0676e45fd60a07e3f1a

                                  SHA1

                                  fab912bc43d42f289779936604b66b63ebc30bbc

                                  SHA256

                                  93c1e2bcf7904a41bb0f20dc63163b4deac9f3c498c94a71f154eb2c69e213ce

                                  SHA512

                                  f33a0194bc70fed17a5e78285882a87cb84384c72f45d8983fd91d45b9cbf7af34dc901cc87a3d10c0fc540e9d76f0fc57f6d6b6f06221ba566581d4bcb588bb

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  86KB

                                  MD5

                                  682cc4c4815ac81ae8eee246de073ef1

                                  SHA1

                                  27529c0e690ffd1142385cdcb6fdc4cb9a0dd293

                                  SHA256

                                  cdb680cd4cffd5e265941deacf0fd273498b37209a1c976bc917b7fabdbca51e

                                  SHA512

                                  b532619bc5db3ef7cdea87482809335e07366ddc99aee0381cdf8d26446f4cec398642c419116b27d788105e30c850b1520ed25e50a05d973e6caa191f702243

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  75KB

                                  MD5

                                  e05cd3a0351b2f79102830d21e109b9c

                                  SHA1

                                  52c1237ad193f8d2305cfdf95572d5840d173028

                                  SHA256

                                  ddc45de59f2b9317e28af74006852975e1a6852e8148c7e2b87d2e6a2b3a7ced

                                  SHA512

                                  e97bccffd4cc161dce9fd0cf777c27aca6eb5d8775fa04c548ed53b2a70c133e41716161624160f3218b67529e4dc027769c6184a4a1b50ed7f7f5f79b25f9dc

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  79KB

                                  MD5

                                  a4089c106a0c6f206c48a663f085d015

                                  SHA1

                                  3954b310768a74275e9ca684420b34acf1e082d4

                                  SHA256

                                  ff4c33c19ac2f0b05a464657d764429a8c7fa9442ef7d8c08b89cee9f6465760

                                  SHA512

                                  26c8e86f26737edc423f5d52fd93da554ebe5b9e42d13ce9dff07709d60ba4a18647ee507fb2fc251f13f72c048c3952ed64123fb3597ea9dd0de479399f4f3e

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  15KB

                                  MD5

                                  0cb768f4b3f99f08505c9d8e3a3b04fa

                                  SHA1

                                  3a51c29a40ca5a0705b8e6a51b626cb63961f327

                                  SHA256

                                  2fd813723f85944894bd163de40d56ea0334a9bdf4d069da61edeabc49a90165

                                  SHA512

                                  21f60e48cd5277fc537dd6469ef4400da130925f6462867630ba645318b5eb0179e5fca953c2097905f2c846203bc022fb84941b34308b8f8b294b8e777805cb

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  33KB

                                  MD5

                                  62bbf051fccbc2001ab38a9157396919

                                  SHA1

                                  0f828b06fa183fd38fe7c98d59323559b36f035e

                                  SHA256

                                  96f3dd004a6c7ab5232134a6bb269acb6d32c4d595fe162365fef4576cd09961

                                  SHA512

                                  32732e5e3fac8ecb0d516611431794d260eda882ff4f4115eea5ff379b253064f99b5123982ec3f961b06544d8132d1e9358b5902328412cc9c40fe4c0c45c7d

                                • C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe

                                  Filesize

                                  9KB

                                  MD5

                                  2ff997d6d7e56916663379be945e365e

                                  SHA1

                                  e58574db81186b15a6137519dc9ab7b813aee673

                                  SHA256

                                  99672268c663c23ca8ffa8ad3c262ed9dd7fad08ae0526a28f36b66964347157

                                  SHA512

                                  4d1c7a7eca551c58d5d2f7dcb75e8c2fa682f2096576a4b38d247ffc78332f073af3e2368c1c3dc0576b43e1a5275d8896296b0dd47cc833b2706be5a2f04b71

                                • C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe

                                  Filesize

                                  36KB

                                  MD5

                                  d2426b842d5602386781ced94ab2428d

                                  SHA1

                                  4ca20abc69bd138699aa7b53c3372e69439c70a1

                                  SHA256

                                  01640fa29141decd5e7421e80b6a6ecb5203d04c95c0198cc38b6a8a5554fe1f

                                  SHA512

                                  cbf2176e2c98dfd4979bb7507201c572b53b4ba6cd34eb5d1dca5c8b89be3d178afaf55087c1b4dd6cfaee6e1dad56a474b42301a6bfddde795a750a9ed5bb1d

                                • C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe

                                  Filesize

                                  45KB

                                  MD5

                                  4494754a12c6a69bd3dab48b99d3085f

                                  SHA1

                                  584dff9e108502cd5d3c481cda225faa44656b67

                                  SHA256

                                  ae5053c37688057ded0486f2cab3a14f7b1371b77a511d39d2b392f01c3d6a53

                                  SHA512

                                  5405142c876ee10e67522161b4aed323461e777487e1421b4393f7c412b4a92a1dd4a169057c51e1d9781fcbf711cf4c1eff36598621d32fde252a347b1fdf78

                                • C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe

                                  Filesize

                                  40KB

                                  MD5

                                  5b2b88ec881597a1dfe7235f3cd2f899

                                  SHA1

                                  8043bb2f2eaf1a72f2947271bd03e39c4e491a2c

                                  SHA256

                                  aafbea6b4da2a25932596e89e14d9c5d362786cc6da5431e906f53c3106045a8

                                  SHA512

                                  a583f910b0320f1eed5dbeadfed36713e7216c99eda356cd0d5e986e982e36bf0f7898c286044213c041e45e3b5db306a2256c46c250282fb139c6030d77fdd8

                                • C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe

                                  Filesize

                                  10KB

                                  MD5

                                  e2e38574c5c722313f7d004ea28b1554

                                  SHA1

                                  edebceae304bd50e933a01c8cc37a4de742fbfbb

                                  SHA256

                                  4bba41597c25b628713ecf0a477249bf950e349905f9408799c929776356b40a

                                  SHA512

                                  3b3041670d4189877a933cb5d660f6fc6b1f6fe9e6b722c960bc8eb649a143cb2c18fb8d5d1799a15fd88cb0c0cfa2c10e3ea69aea591c9b347aa34b065045b9

                                • C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe

                                  Filesize

                                  78KB

                                  MD5

                                  e4d6a521aa87939b5588db31633cb8b6

                                  SHA1

                                  80920f7691f357b73c519003a5aa9ba0dfe5fa3d

                                  SHA256

                                  81a88b54a8b1b8a5567a5af10e8530373427c1d0a6c67fe52a2daf2601bf3947

                                  SHA512

                                  f08209f21dae2da948f1e41392df621b40f4c569d2fc044dcebda5446f86545826e7fb9739d67a381f0fd82d65b8a071fc1ed14ca8355fc9aa4fb363ec10dd6b

                                • C:\Users\Admin\Pictures\rDElbH5QpO9ly3XgkuzkyUjd.exe

                                  Filesize

                                  7KB

                                  MD5

                                  5b423612b36cde7f2745455c5dd82577

                                  SHA1

                                  0187c7c80743b44e9e0c193e993294e3b969cc3d

                                  SHA256

                                  e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                  SHA512

                                  c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                  Filesize

                                  10KB

                                  MD5

                                  16e9c5a1befec67dbae2f2c053fed9bb

                                  SHA1

                                  9e4022c5de43784a9a50072f16565ba0d879b270

                                  SHA256

                                  a446c48ea8add40ad311f8cc603354cb09201197f0299539a3b15b89ce1c8054

                                  SHA512

                                  2879db070748cf18ce70fdf931bdb7eb4267815c2a7b1d9067bdf16d1b2602c5a4e18974be0295f583c8a494bcf1e560fdc00daa3869c10829b2690909290bf4

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                  Filesize

                                  22KB

                                  MD5

                                  cae7ebc76dc7a0bed65793e5e290b2ad

                                  SHA1

                                  964ae079611b62e55a9569fe434fe311f8df90e3

                                  SHA256

                                  167e6f4d331af6d88a2200720788464ca0f002cf4b0488311dd85ead5bef6cfb

                                  SHA512

                                  b1ab87f64d53994ba54d1ef5d78af0ea92bc787a69ac3d08ee3a1841b187486f67851c1520ea8149883ffb358ef54451a411e93b70c6c235e0c4199f7f4b003b

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  18KB

                                  MD5

                                  fd2c250fe9c3c097194732557d19b425

                                  SHA1

                                  a640ea0802ea6126cca40e2a18769910d83b420b

                                  SHA256

                                  d78aa4f9fe5b1f2a4933783cab8fe071b590546421a490034506a3ebfc99013f

                                  SHA512

                                  0d03d75503ab93eedc2f2f92b0a47b0f3fe8643a0cb5890b558267951254b8536cc6a14e9b1508ce30d8ae705e20f327295f30a33dac1288e4d6b264e72b801a

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  17KB

                                  MD5

                                  cbbcfe696480c6eeb091e48bef543a9e

                                  SHA1

                                  3d23caeae74c35211e5db7874909437d5c6c50ff

                                  SHA256

                                  26ea3e1417638a165a57c8b683adf620adc3c2ae91b89d5d72f9c9bf046c6e65

                                  SHA512

                                  3464989f79c4985432e5d1db68dff1dca1caddb463d58aaafc66eb27ca0f9fddab0385f1cb4916d6f5f9ead84d05ac4d01c09d0195fe52dccabbdcd8b3cf97e1

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  17KB

                                  MD5

                                  471ab937d60755210c181f880ee5f452

                                  SHA1

                                  8254c064fcd1f28f907acfd0c319367f548cfc0b

                                  SHA256

                                  4bf5c299e00b281b49d6b31483475d831a22570c3ed27f6b3f07a3865f226583

                                  SHA512

                                  b5d1cc31cc37f515715dadf0d283b20694f93569e628a96d881b3e260ff03ad8d39491deca12bfb61a4b7a0da43fded7741e9c61fc88253221d5490ba31012fd

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  17KB

                                  MD5

                                  c6c6248eb9b27e1d2640b01a9a07bca2

                                  SHA1

                                  f6ff719faef5150a4bf0900ceadfee3a609fdb13

                                  SHA256

                                  00f8def90260fff7fe597551d0c90ec1ffddc2548508719e90ad460cae82e464

                                  SHA512

                                  26559c9584e5a1e3eb716408e3eb5a32d3cdb51757c21c454c49a1100a171581c5754fff2fc42700741e4700f93410c5657f1d371936882df4ed812cdefd1150

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  17KB

                                  MD5

                                  14a6805f4c052f918e00afd47081f43c

                                  SHA1

                                  c1893957bd18da1fd72a8954fdb72fc45928c0c6

                                  SHA256

                                  83ab8c697e307f7847ffc9ee43ece46ae94c5d3d51872309097016535ee7dc75

                                  SHA512

                                  8efe19df6b88de18e8da355051e442535aac17eddaf1031d7d3c283e4dadec30cd26611b23634f8b715329a06431c5ac0070b4015f8dcfd89b17b964768319b5

                                • C:\Windows\rss\csrss.exe

                                  Filesize

                                  32KB

                                  MD5

                                  44d20872b7222de507aac19b5f707966

                                  SHA1

                                  462ae517ff36179c3ecfb2066c01da93b01bd094

                                  SHA256

                                  cf9320c55339712cab2d57df4a0489780f221774f46ecc594b9841ccf91f6e44

                                  SHA512

                                  6a0aef039ce8663611d7484340019917cb7761b7b627b6179f53416f7602a1641c750a5f794e484df3982f169d85cb62fef8841b422cb210c55ca0c1c61d6219

                                • C:\Windows\rss\csrss.exe

                                  Filesize

                                  135KB

                                  MD5

                                  fd2273871bf04deaba0df9cd197eb4d8

                                  SHA1

                                  dc111c92a34f24cd6e5e048487720280eeb9f6c0

                                  SHA256

                                  05fb58ea4db28ec042ebf824de9e7c24391fe61d628cd97ffa8096e20d5fa0c0

                                  SHA512

                                  de8e99d93982a1c56826205a0232f902ffd8a8ef639734f7162d4d6d2c5362abb802b1696bff7aedb0d84852adc508c85be229175f930d57800c2542a7a8fec4

                                • C:\Windows\rss\csrss.exe

                                  Filesize

                                  107KB

                                  MD5

                                  c2dfad2ee5e991ff9eaf2f8262b8a47b

                                  SHA1

                                  2b281e95927c7fb1c266cbf9e7ca1b00799bf8e5

                                  SHA256

                                  d8958dfa6b4e2900b35e618732f3a4d4ee2e6bfdc0a3b78a9f64b009a45ca9df

                                  SHA512

                                  85affcf0599b7961792e56dced497b5992695f0f3972529625de21d53506be545d843c10fe79340d81e3c5873ab463c6dfeee57d17b33cfabf71fd0fb91724e1

                                • C:\Windows\windefender.exe

                                  Filesize

                                  47KB

                                  MD5

                                  15afd1135cfda4d9d098df270bf6e6bd

                                  SHA1

                                  521b18e8ca9620053eb8988d9d12c2f3a77ad8d7

                                  SHA256

                                  52fbe2f7da8c24aaf1833e5d9eca2f86eed0c50c2ab53b372a5bb646d57964f2

                                  SHA512

                                  0fbb03f20eadc54430c96162c668d37deba563074170cb6011394bc3ccc787be00957775001cb738761dbad7ddf92dd597357de02bd24a810740a95c87fd2d9a

                                • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.dll

                                  Filesize

                                  53KB

                                  MD5

                                  31b9b20cbc7091d1a39c64606f9686ae

                                  SHA1

                                  ed890d770c2bf5fe9952573722921ce863a2c68f

                                  SHA256

                                  fc9e068dd96f0fd15e5dab5456377f8e20fcee81547b3488db20be9cbc45fc78

                                  SHA512

                                  a7f391cb827462b28a746d09dcd2c2ee42048aa2f3b4b5045f9d6a20251c82ebefeafb3fe9bc2096d99c5f0a1cbba0c56bbd48f5d0b2536d9af679a1058e25be

                                • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.dll

                                  Filesize

                                  30KB

                                  MD5

                                  d21f371a3a141731f1f16fac91a82976

                                  SHA1

                                  e391950b7eb71ac7ebdb16c8d11ac84f90478a6a

                                  SHA256

                                  0bd0fda4b73f5cb203f5e187986fbf3cbaca1e74798ff47144100a21942eb180

                                  SHA512

                                  96b0852e1835cbf25a02b706e85440903850ba107964932fcadb83f2d6b70e3a547a38c8f6986e3546402dcf68d7ba20cf2bdbc7c74b2b888d88a32c4fb78f6b

                                • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll

                                  Filesize

                                  96KB

                                  MD5

                                  56467cfc56842d380ae0d52766a70dd2

                                  SHA1

                                  2cfad8f05cd2c98ab3de4e3cfee47663818675ea

                                  SHA256

                                  469d18116ed932b3cb490ea46da537294c6ddc1f1a1db167b437980969445e71

                                  SHA512

                                  292c5cf1313f5e29306aa85793c9c9dcc9bdc75e29ccc33d1bb2ed2fa8ca30725bc009f7cfdbd606cf90e61ae4d9409800584f3aa0199f4f6544704f9272e72a

                                • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll

                                  Filesize

                                  18KB

                                  MD5

                                  847feae4bcf7ea65e8d67e96cc670373

                                  SHA1

                                  61aeee2f99a9aa944062282c0f3d752f4774a7ad

                                  SHA256

                                  25e197415afacead8ebd979653ca0c83615cc3dabce1035b5b74d7886e745d47

                                  SHA512

                                  53306d2f556d60eed4f3a5acde3aa8a631e08059e8c4ed524bea4a51f91fdabd84ea23bc446394bf5f250cbaf9d8f03cfeb1227a084273f8811aa01c94db9c91

                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2312180505047651756.dll

                                  Filesize

                                  1KB

                                  MD5

                                  64577d7db77c77574d7ab48f2020aaf2

                                  SHA1

                                  cbaac8f01b59547839fce86485005ea91d66b5ce

                                  SHA256

                                  4056c047d9513a8e6a6f49fc29fb5ba6d5b6fd9cb4916a5e60dadda149389f99

                                  SHA512

                                  34ae3f5ca6508ec7c1514d653b69a6ab2f8823e4ba55513fa9d1316927dce21c1aa46b80ce0957339790bcbea8dfd421c82b2629c2b0e04eb93b0a1e2cd9789e

                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2312180505050772428.dll

                                  Filesize

                                  30KB

                                  MD5

                                  f01b8be7831f6030b6b585e49c7bc756

                                  SHA1

                                  e55573b76486f2d01cf97d7e945969d82edccb22

                                  SHA256

                                  862937ad11c8fbc8628416011ae286076aa8391c392a5e5679e8b4dbb9d98423

                                  SHA512

                                  b7e4b34d45646aea0af2fa33f9d13f4675ba2760aecf4226706ab737262aa6975c1fb2232e394fca4465ed32e8321b603a7efbd286f583459c67a23896c38294

                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2312180505053864008.dll

                                  Filesize

                                  5KB

                                  MD5

                                  3a45cb58af06ff132af5b283cae424eb

                                  SHA1

                                  ad1f9b36906580e981c29e70aacd23501398854f

                                  SHA256

                                  ea68279a95c0782c76086e2ecd8bb4292cfb88871e870aef0ab179fb7e371820

                                  SHA512

                                  e995635edb72c2af3f4330e5cd5df0f3a7c61b97384e07702f89e47d461e2834f7ea8de862db5e97a23ac2a676fab2065a98adf51694ffb31ea2bd58990bd447

                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2312180505056133220.dll

                                  Filesize

                                  5KB

                                  MD5

                                  77615f16f5562e77d40552fec7277276

                                  SHA1

                                  f4df8f3cc012472d01ba27b6a9ffcce081160438

                                  SHA256

                                  b8a0fd4f5f41be324a489cae27a30561e289963f41beb3570c44840934614ecd

                                  SHA512

                                  b88590a4d4cc5bfc29a8751f234e14688410c2e1068246915f7065900a8c8fa2562c1dd26e0b08692c30fe8265a76c62003a74aa51104a4720d839dbf79f3104

                                • \Users\Admin\AppData\Local\Temp\Opera_installer_2312180505058031524.dll

                                  Filesize

                                  9KB

                                  MD5

                                  89a4c76fb9fa0f97671c366fb5269daa

                                  SHA1

                                  736d2d9556260d850cf580e64e97a25d55045270

                                  SHA256

                                  a09e3281f2b5a4c4efa8edb882cb7ca09b65331a0e349090b1a0b5dd1ddd405c

                                  SHA512

                                  421d1aed4e6177331f6ec38576ccceba4e42fb6c5d8c81f64d25c4ada3c42068a4182104ce860899600bc5e5bd9fc09ddd5ca27887debc6141a66447f0c9c9fa

                                • \Users\Admin\AppData\Local\Temp\is-RC6R2.tmp\_isetup\_iscrypt.dll

                                  Filesize

                                  2KB

                                  MD5

                                  a69559718ab506675e907fe49deb71e9

                                  SHA1

                                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                  SHA256

                                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                  SHA512

                                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                • \Users\Admin\AppData\Local\Temp\is-RC6R2.tmp\_isetup\_isdecmp.dll

                                  Filesize

                                  9KB

                                  MD5

                                  1ddbc6baac40556369c4c4cb373eb3f3

                                  SHA1

                                  d7c367f836b1a1e323d919596fc5d784cddd6ca5

                                  SHA256

                                  458b400841337771467cd851a8a46a4f591d556fc57a1b1d478dadefd189f63e

                                  SHA512

                                  4d55602d9fc710b07de7bbd434e1c3f90a31e559bdf8e6acc8340e19ef017a0e50c0a0da7ae4fb393706c0d2c5af5c0e08ff14cbb07102966aaf9b9c79be7824

                                • \Users\Admin\AppData\Local\Temp\is-RC6R2.tmp\_isetup\_isdecmp.dll

                                  Filesize

                                  2KB

                                  MD5

                                  55efa9da431995ed878f93de61e85c3e

                                  SHA1

                                  3719593a3a1ae83709219c6d9c3826cee193b218

                                  SHA256

                                  719ff931d9aa6f529dadaf3a64b0d94fbd8f77985d795536f6b324560d3d9282

                                  SHA512

                                  87d617e03de796d7b2d0d8e04a74560b75cb5c59e8a20273869508a4f843c58ddfcdee3456931bbf3241e841598a809e7d14ebba376f79084a424357ff7df513

                                • \Users\Admin\AppData\Local\Temp\nsyB45D.tmp\Checker.dll

                                  Filesize

                                  33KB

                                  MD5

                                  5c9f09c08ff03fff01447d3ced4fe8a1

                                  SHA1

                                  0e1848cf116da406456631ec679c25b940851292

                                  SHA256

                                  89ec12969e35fa1f8cb6cc6c4187a4a187aacabbb89123cdfad014b9eaa65b39

                                  SHA512

                                  e13ac3cabe7fceba3e2ada47dad4cfb35b204f3f881dddb4059189c6a14522a57ec03420ceba0e7cd649a15e41d7405e4cbec5c4de5e9d6bab72b3f694e3bdf9

                                • \Users\Admin\AppData\Local\Temp\nsyB45D.tmp\Zip.dll

                                  Filesize

                                  70KB

                                  MD5

                                  5ca52289751749ddd364f972a09fa7d5

                                  SHA1

                                  01cf6e21e740e2b73d2f574c57ed6cf478883673

                                  SHA256

                                  ca0a25f5fdc51ae77e37d57fe7d998a3ba37e6a647ebe0b872a0aed4dc05a801

                                  SHA512

                                  0c928a0c4816805d07c8f644c1a5fbf5158961af91b25e333353941ba6efe655f94459a4d0b19d99fd4c598b7caecac74157e923e83d6d1dadefb1783ed47245

                                • \Windows\servicing\Editions\Search.dll

                                  Filesize

                                  11KB

                                  MD5

                                  0294f6dec077d029a5f3b74fb95ffc02

                                  SHA1

                                  2c336a94a95e6582d39f029e0bdc6b79f44448f2

                                  SHA256

                                  f231be9616d80e303339cad54c1fc6a36c09f4d09b33a9cc60535f141691b048

                                  SHA512

                                  df49439c21a1f2f6de1960d7494833816cbc65e335351487aa740b2064a95633d8234b7682522f956a94c44198a287c29aa2f0da39a3ed9c08acf44de4c110a2

                                • \Windows\servicing\Editions\Search.dll

                                  Filesize

                                  103KB

                                  MD5

                                  79f9bc3ada269ed2028754242544b161

                                  SHA1

                                  c266df8993f73a3c17f0fa33d2b918640e7640a4

                                  SHA256

                                  8cd67e34da6ece40b63864e3e8eb821e7f4459853bc3e0601da5436764a348ce

                                  SHA512

                                  0f86a7ef6f49b47ddb160a6c635f7cb1cc2fe7c068bd2d7fe0155bdd4814a3c52528447166edeb7bae60224aee2519eb9ca6854bd8edb1745b4d3861ef9cbb2f

                                • memory/780-1711-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/1424-516-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1424-141-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1424-139-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1524-380-0x0000000000040000-0x0000000000568000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1756-338-0x0000000000040000-0x0000000000568000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1888-705-0x00000000030D0000-0x000000000310A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/1888-679-0x0000000010000000-0x000000001001F000-memory.dmp

                                  Filesize

                                  124KB

                                • memory/1888-693-0x0000000004200000-0x0000000004E27000-memory.dmp

                                  Filesize

                                  12.2MB

                                • memory/2428-342-0x0000000000040000-0x0000000000568000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/2612-645-0x00000000028A0000-0x0000000002CA0000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/2612-332-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/2612-640-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/2612-1139-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/2612-334-0x00000000028A0000-0x0000000002CA0000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/2612-644-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/2804-522-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2804-635-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/2804-168-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2808-3-0x00000000054D0000-0x0000000005562000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/2808-0-0x0000000000B80000-0x0000000000C3C000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/2808-4-0x0000000005570000-0x000000000560C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2808-2-0x0000000005930000-0x0000000005E2E000-memory.dmp

                                  Filesize

                                  5.0MB

                                • memory/2808-11-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/2808-7-0x0000000005450000-0x000000000546A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2808-1-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/2808-6-0x0000000005770000-0x0000000005814000-memory.dmp

                                  Filesize

                                  656KB

                                • memory/2808-5-0x0000000005480000-0x0000000005490000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3032-359-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3032-30-0x00000000082F0000-0x0000000008366000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/3032-373-0x000000007E480000-0x000000007E490000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3032-55-0x0000000070300000-0x000000007034B000-memory.dmp

                                  Filesize

                                  300KB

                                • memory/3032-14-0x0000000004800000-0x0000000004836000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/3032-61-0x0000000009510000-0x00000000095B5000-memory.dmp

                                  Filesize

                                  660KB

                                • memory/3032-54-0x00000000093D0000-0x0000000009403000-memory.dmp

                                  Filesize

                                  204KB

                                • memory/3032-62-0x0000000004890000-0x00000000048A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3032-56-0x00000000093B0000-0x00000000093CE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3032-20-0x0000000007B10000-0x0000000007B76000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3032-53-0x000000007E480000-0x000000007E490000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3032-18-0x0000000007890000-0x00000000078B2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/3032-63-0x00000000096F0000-0x0000000009784000-memory.dmp

                                  Filesize

                                  592KB

                                • memory/3032-15-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3032-488-0x0000000006E80000-0x0000000006E88000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3032-480-0x0000000006E90000-0x0000000006EAA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3032-511-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3032-17-0x0000000007220000-0x0000000007848000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/3032-22-0x0000000007BA0000-0x0000000007BBC000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/3032-23-0x0000000008050000-0x000000000809B000-memory.dmp

                                  Filesize

                                  300KB

                                • memory/3032-19-0x00000000078C0000-0x0000000007926000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3032-21-0x0000000007C40000-0x0000000007F90000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/3220-368-0x0000000000040000-0x0000000000568000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/3232-632-0x00000000705D0000-0x000000007061B000-memory.dmp

                                  Filesize

                                  300KB

                                • memory/3232-515-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3232-517-0x0000000006BD0000-0x0000000006BE0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3232-519-0x0000000006BD0000-0x0000000006BE0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3232-528-0x0000000007E60000-0x0000000007EAB000-memory.dmp

                                  Filesize

                                  300KB

                                • memory/3232-518-0x0000000007840000-0x0000000007B90000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/3232-646-0x0000000006BD0000-0x0000000006BE0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3232-643-0x0000000009DE0000-0x0000000009E85000-memory.dmp

                                  Filesize

                                  660KB

                                • memory/3232-547-0x0000000008E60000-0x0000000008E9C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/3232-634-0x000000006C820000-0x000000006CB70000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/3568-525-0x0000000005260000-0x0000000005270000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3568-526-0x0000000005260000-0x0000000005270000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3568-524-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3704-8-0x0000000000400000-0x0000000000408000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3704-354-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3704-13-0x00000000739D0000-0x00000000740BE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/3704-16-0x0000000005610000-0x0000000005620000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3844-1814-0x0000000000400000-0x0000000000488000-memory.dmp

                                  Filesize

                                  544KB

                                • memory/3844-1818-0x0000000000400000-0x0000000000488000-memory.dmp

                                  Filesize

                                  544KB

                                • memory/3844-2001-0x0000000007820000-0x0000000007C20000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/4008-358-0x0000000000940000-0x0000000000E68000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4952-637-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-527-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-523-0x0000000002A70000-0x0000000002E74000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/4952-1146-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-935-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-1142-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-324-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4952-320-0x0000000002E80000-0x000000000376B000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/4952-311-0x0000000002A70000-0x0000000002E74000-memory.dmp

                                  Filesize

                                  4.0MB