Analysis

  • max time kernel
    98s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 19:03

General

  • Target

    fcbc7c287b7d172e104e50be240ee3239a0b3bfd25026ab26698e6eb8987f6d3.exe

  • Size

    1.9MB

  • MD5

    15085bc8a44c0bceaaa6d67e55202baf

  • SHA1

    7c0d973ca1e226333885d1d0f8e4400d0d5e9148

  • SHA256

    fcbc7c287b7d172e104e50be240ee3239a0b3bfd25026ab26698e6eb8987f6d3

  • SHA512

    987cf8fde4b0b39fb5fa9498b4319ba3b98ccf8d5a7163654ed49bb8e19749a1eae9aded496a69c9ffe67a19a889751734fda09718b6f3b808081a2f113791fb

  • SSDEEP

    49152:skZsgDYadFGnrR4ks5Y5X0BI7lOSJmXf/0Pty6h:xnDt+s5Y5u88SEXf/v6

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://associationokeo.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect ZGRat V1 4 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 22 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcbc7c287b7d172e104e50be240ee3239a0b3bfd25026ab26698e6eb8987f6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\fcbc7c287b7d172e104e50be240ee3239a0b3bfd25026ab26698e6eb8987f6d3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3232
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:5304
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:1188
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:4784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:5312
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:64
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 1248
                    4⤵
                    • Program crash
                    PID:2992
              • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
                "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3096
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4620
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                2⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:4584
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                  3⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1944
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    4⤵
                      PID:3616
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1380
                • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                  2⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2076
                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                    "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4940
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1252
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4900
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profiles
                          6⤵
                            PID:1004
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3932
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                        4⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:64
                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1268
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                    2⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    PID:4540
                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3120
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                      • Checks computer location settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:524
                      • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                        "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2664
                      • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                        "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                        4⤵
                        • Executes dropped EXE
                        • Modifies system certificate store
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1060
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                        4⤵
                          PID:4508
                          • C:\Windows\SysWOW64\choice.exe
                            choice /C Y /N /D Y /T 3
                            5⤵
                              PID:4052
                      • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                        2⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        PID:5132
                      • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe
                        "C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1548
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          3⤵
                            PID:6116
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 1248
                              4⤵
                              • Program crash
                              PID:5608
                        • C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe
                          "C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"
                          2⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:3660
                        • C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe
                          "C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:6028
                        • C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe
                          "C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe"
                          2⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          PID:3368
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1632
                          • C:\Windows\system32\cmd.exe
                            "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit
                            3⤵
                              PID:5468
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'
                                4⤵
                                • Creates scheduled task(s)
                                PID:3840
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              3⤵
                                PID:3956
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4504
                                • C:\Users\Admin\Pictures\7O3dSTs2dLeoTzKoxYIQwGZr.exe
                                  "C:\Users\Admin\Pictures\7O3dSTs2dLeoTzKoxYIQwGZr.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  PID:5344
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5688
                                  • C:\Users\Admin\Pictures\7O3dSTs2dLeoTzKoxYIQwGZr.exe
                                    "C:\Users\Admin\Pictures\7O3dSTs2dLeoTzKoxYIQwGZr.exe"
                                    5⤵
                                      PID:3920
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        6⤵
                                          PID:6780
                                    • C:\Users\Admin\Pictures\sKcyeGml9PngArF8Qn8q1Mtk.exe
                                      "C:\Users\Admin\Pictures\sKcyeGml9PngArF8Qn8q1Mtk.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      PID:2028
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        5⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4752
                                      • C:\Users\Admin\Pictures\sKcyeGml9PngArF8Qn8q1Mtk.exe
                                        "C:\Users\Admin\Pictures\sKcyeGml9PngArF8Qn8q1Mtk.exe"
                                        5⤵
                                          PID:2360
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            6⤵
                                              PID:6120
                                        • C:\Users\Admin\Pictures\QQHPttB7Ptp7ZyFPulifRUQx.exe
                                          "C:\Users\Admin\Pictures\QQHPttB7Ptp7ZyFPulifRUQx.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          PID:4840
                                          • C:\Users\Admin\AppData\Local\Temp\u3qg.0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\u3qg.0.exe"
                                            5⤵
                                              PID:4580
                                            • C:\Users\Admin\AppData\Local\Temp\u3qg.1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\u3qg.1.exe"
                                              5⤵
                                                PID:1580
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                                                  6⤵
                                                    PID:4056
                                                    • C:\Windows\SysWOW64\chcp.com
                                                      chcp 1251
                                                      7⤵
                                                        PID:5384
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                                        7⤵
                                                        • Creates scheduled task(s)
                                                        PID:6008
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 216
                                                    5⤵
                                                    • Program crash
                                                    PID:5368
                                                • C:\Users\Admin\Pictures\y0oHggq82RUlHWhKIdInIgMP.exe
                                                  "C:\Users\Admin\Pictures\y0oHggq82RUlHWhKIdInIgMP.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:4040
                                                  • C:\Users\Admin\AppData\Local\Temp\u348.0.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\u348.0.exe"
                                                    5⤵
                                                      PID:5684
                                                    • C:\Users\Admin\AppData\Local\Temp\u348.1.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\u348.1.exe"
                                                      5⤵
                                                        PID:3864
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                                                          6⤵
                                                            PID:5524
                                                            • C:\Windows\SysWOW64\chcp.com
                                                              chcp 1251
                                                              7⤵
                                                                PID:2628
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                                                7⤵
                                                                • Creates scheduled task(s)
                                                                PID:6404
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 1212
                                                            5⤵
                                                            • Program crash
                                                            PID:5804
                                                        • C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe
                                                          "C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          PID:5140
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            5⤵
                                                              PID:1560
                                                            • C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe
                                                              "C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe"
                                                              5⤵
                                                                PID:6948
                                                            • C:\Users\Admin\Pictures\sZll9bsbvaM4jdZFQBuCRYKh.exe
                                                              "C:\Users\Admin\Pictures\sZll9bsbvaM4jdZFQBuCRYKh.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              PID:3784
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                5⤵
                                                                  PID:760
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 652
                                                                    6⤵
                                                                    • Program crash
                                                                    PID:5004
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 660
                                                                    6⤵
                                                                    • Program crash
                                                                    PID:3228
                                                              • C:\Users\Admin\Pictures\LzLpZG0OTRnk8eOQMSIByzzn.exe
                                                                "C:\Users\Admin\Pictures\LzLpZG0OTRnk8eOQMSIByzzn.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:5436
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 2228
                                                                  5⤵
                                                                  • Program crash
                                                                  PID:2200
                                                              • C:\Users\Admin\Pictures\Y9y0JACAyQ1vzo3wfPmlA47g.exe
                                                                "C:\Users\Admin\Pictures\Y9y0JACAyQ1vzo3wfPmlA47g.exe"
                                                                4⤵
                                                                  PID:3812
                                                                • C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe
                                                                  "C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe" --silent --allusers=0
                                                                  4⤵
                                                                    PID:1736
                                                                    • C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe
                                                                      C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x6b2421f8,0x6b242204,0x6b242210
                                                                      5⤵
                                                                        PID:6080
                                                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\DmF0sDr4KSynCGpaPp21SjsN.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\DmF0sDr4KSynCGpaPp21SjsN.exe" --version
                                                                        5⤵
                                                                          PID:5220
                                                                        • C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe
                                                                          "C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1736 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240324190506" --session-guid=bf709c77-1349-42e0-9ffb-e5f6b1adecfa --server-tracking-blob=NWI2MDc2OTM1ZTlkNDVjODRkMGQyMjcwYjFjZGM4NjlkMTBkM2Q1ZDhjOWU3MzNlODcyZWE1OTE1ZjU2NGU0Mzp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcxMTMwNzA5My4wNTM3IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiJhZDgyMTg3MC1iODc5LTQ3OTQtYTdiMy03Y2QxNjdiZjUwNjMifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=F004000000000000
                                                                          5⤵
                                                                            PID:4124
                                                                            • C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe
                                                                              C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2f0,0x2f4,0x2bc,0x2f8,0x6a8c21f8,0x6a8c2204,0x6a8c2210
                                                                              6⤵
                                                                                PID:392
                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241905061\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241905061\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"
                                                                              5⤵
                                                                                PID:6884
                                                                            • C:\Users\Admin\Pictures\43Q4HuuIt9GagH0n8GdiJ9Tf.exe
                                                                              "C:\Users\Admin\Pictures\43Q4HuuIt9GagH0n8GdiJ9Tf.exe"
                                                                              4⤵
                                                                                PID:5420
                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSDA9C.tmp\Install.exe
                                                                                  .\Install.exe
                                                                                  5⤵
                                                                                    PID:1108
                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSE104.tmp\Install.exe
                                                                                      .\Install.exe /gDgGCdidUcr "385118" /S
                                                                                      6⤵
                                                                                        PID:3384
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                                          7⤵
                                                                                            PID:4824
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                                              8⤵
                                                                                                PID:4756
                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                                  9⤵
                                                                                                    PID:6420
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                                    9⤵
                                                                                                      PID:6628
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                                  7⤵
                                                                                                    PID:3208
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                                      8⤵
                                                                                                        PID:6304
                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                                          9⤵
                                                                                                            PID:6484
                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                                            9⤵
                                                                                                              PID:6728
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /CREATE /TN "gCWccmOhD" /SC once /ST 12:42:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                          7⤵
                                                                                                          • Creates scheduled task(s)
                                                                                                          PID:6336
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /run /I /tn "gCWccmOhD"
                                                                                                          7⤵
                                                                                                            PID:6712
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /DELETE /F /TN "gCWccmOhD"
                                                                                                            7⤵
                                                                                                              PID:2652
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"
                                                                                                    2⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4920
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe" /F
                                                                                                      3⤵
                                                                                                      • Creates scheduled task(s)
                                                                                                      PID:5056
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 64 -ip 64
                                                                                                  1⤵
                                                                                                    PID:3252
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6116 -ip 6116
                                                                                                    1⤵
                                                                                                      PID:3596
                                                                                                    • C:\Windows\system32\regsvr32.exe
                                                                                                      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B532.dll
                                                                                                      1⤵
                                                                                                        PID:1444
                                                                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                          /s C:\Users\Admin\AppData\Local\Temp\B532.dll
                                                                                                          2⤵
                                                                                                            PID:5200
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4840 -ip 4840
                                                                                                          1⤵
                                                                                                            PID:1940
                                                                                                          • C:\Windows\SysWOW64\dialer.exe
                                                                                                            "C:\Windows\system32\dialer.exe"
                                                                                                            1⤵
                                                                                                              PID:6040
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 760 -ip 760
                                                                                                              1⤵
                                                                                                                PID:5752
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 760 -ip 760
                                                                                                                1⤵
                                                                                                                  PID:5144
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                  1⤵
                                                                                                                    PID:4560
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                                                                                                    1⤵
                                                                                                                      PID:1708
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000053001\amadka.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1000053001\amadka.exe"
                                                                                                                        2⤵
                                                                                                                          PID:444
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"
                                                                                                                          2⤵
                                                                                                                            PID:2996
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                              3⤵
                                                                                                                                PID:5248
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                3⤵
                                                                                                                                  PID:5668
                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:4184
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 1208
                                                                                                                                      4⤵
                                                                                                                                      • Program crash
                                                                                                                                      PID:3728
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"
                                                                                                                                  2⤵
                                                                                                                                    PID:1496
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"
                                                                                                                                    2⤵
                                                                                                                                      PID:3164
                                                                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
                                                                                                                                        3⤵
                                                                                                                                          PID:5084
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                                                                                                          3⤵
                                                                                                                                            PID:4944
                                                                                                                                            • C:\Users\Admin\Pictures\6vb0hIdOp2JsOU7Q7KPLH1wc.exe
                                                                                                                                              "C:\Users\Admin\Pictures\6vb0hIdOp2JsOU7Q7KPLH1wc.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:384
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uao.0.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uao.0.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:6804
                                                                                                                                                • C:\Users\Admin\Pictures\rcnzD113F73515LXXacDM7nj.exe
                                                                                                                                                  "C:\Users\Admin\Pictures\rcnzD113F73515LXXacDM7nj.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:3772
                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      powershell -nologo -noprofile
                                                                                                                                                      5⤵
                                                                                                                                                        PID:6536
                                                                                                                                                    • C:\Users\Admin\Pictures\tS0FNMNrGNBSe0kpz2qoDJ50.exe
                                                                                                                                                      "C:\Users\Admin\Pictures\tS0FNMNrGNBSe0kpz2qoDJ50.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:3680
                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell -nologo -noprofile
                                                                                                                                                          5⤵
                                                                                                                                                            PID:4812
                                                                                                                                                        • C:\Users\Admin\Pictures\WDxcr4fHjTRq6qywvzyfrL2K.exe
                                                                                                                                                          "C:\Users\Admin\Pictures\WDxcr4fHjTRq6qywvzyfrL2K.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:4156
                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:6208
                                                                                                                                                            • C:\Users\Admin\Pictures\7WArbbvutfuljHOaA4uj2xcI.exe
                                                                                                                                                              "C:\Users\Admin\Pictures\7WArbbvutfuljHOaA4uj2xcI.exe"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:4112
                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  powershell -nologo -noprofile
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:6840
                                                                                                                                                                • C:\Users\Admin\Pictures\LArAb9fDTWqRlGXJYcUuHBIB.exe
                                                                                                                                                                  "C:\Users\Admin\Pictures\LArAb9fDTWqRlGXJYcUuHBIB.exe"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:4208
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 2132
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:6380
                                                                                                                                                                  • C:\Users\Admin\Pictures\tZXro41k6JgbN6iW8VQm6HqO.exe
                                                                                                                                                                    "C:\Users\Admin\Pictures\tZXro41k6JgbN6iW8VQm6HqO.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:1384
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\u12g.0.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\u12g.0.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:6432
                                                                                                                                                                      • C:\Users\Admin\Pictures\0SxHcmmONZxjJwmNPqif8g3o.exe
                                                                                                                                                                        "C:\Users\Admin\Pictures\0SxHcmmONZxjJwmNPqif8g3o.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:6276
                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:7120
                                                                                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                                                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:5688
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4040 -ip 4040
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:5724
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5560
                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:4760
                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:1836
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\D108.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\D108.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:3208
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 772
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Program crash
                                                                                                                                                                                    PID:4612
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5436 -ip 5436
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:5728
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3208 -ip 3208
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:3948
                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4184 -ip 4184
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:1720
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:6924
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4166.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\4166.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:7148
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4208 -ip 4208
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:6656
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7A98.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7A98.exe
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:1068

                                                                                                                                                                                              Network

                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                              Downloads

                                                                                                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                593KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                fe3aab3ae544a134b68e881b82b70169

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WDxcr4fHjTRq6qywvzyfrL2K.exe.log

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                425B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                4eaca4566b22b01cd3bc115b9b0b2196

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                e743e0792c19f71740416e7b3c061d9f1336bf94

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c6485884af3af363550441d251b4b4f2

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5e93ebfef0e32805361bbdc317810d18f8e46ba2

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8c153a7b1c6661ceef420d7c797ed89662b6f3e6b058af87c85a6670ac186dda

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                9ff0f5235bc04e87020ba388316fa28f49034e05b4370a0f0d690fd1a0726b8f3b11a8423b39593e66aa86902e47db2c5757c1358647e6f141500c475fa908ed

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                e72c440b1a775dec83ef9a15c452a141

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                238522c461259009182e272b0e4628d1597be5a9

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d2fae5e659f5f7d6167ceb5a9ddd9344d1d7b32ea397fd5a11cbb2a0685c1f7a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                495a6ac13606421c167d8476977888c7c5c35456b8645ef20de1ea52a236d84d337ecf12bcd1b2c437cf7e7dfa1e0aef38145c55c7326e09ab724b955281ca08

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241905061\additional_file0.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                12af6aa802303d11cb333038e253de9b

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                bf5b85518fef17dc2211fdc284a8cbc4bbaa233a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                78d19b4878e757e39a3026664b97635495fb4f244132fca420c7bcb9f20b7162

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d48d0facea693b3764b986a12e5d1d292272f9d8831669645328f78fc69331dfcadd8a69345943faa093ecf6a11eef3db94ee33df84168199af26c6abfcfc655

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241905061\opera_package

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.5MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                3725fdeec032cf3227fd992aef332638

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4f27f08cef1608b70d2d9e4ea49733266dc45b05

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                7c119cedb69d044bc059862c02bf50ab1c4ad8a3c72616457c5d0f59697526b5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                505069a778075080700ba0b066571c14c524167afd7074fdd7b1ff8af17fe5e680b0fecf2366fce0441c6729f1b6144491544d81453544b4fd6560abed21bc51

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                15085bc8a44c0bceaaa6d67e55202baf

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                7c0d973ca1e226333885d1d0f8e4400d0d5e9148

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                fcbc7c287b7d172e104e50be240ee3239a0b3bfd25026ab26698e6eb8987f6d3

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                987cf8fde4b0b39fb5fa9498b4319ba3b98ccf8d5a7163654ed49bb8e19749a1eae9aded496a69c9ffe67a19a889751734fda09718b6f3b808081a2f113791fb

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                534KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a3f8b60a08da0f600cfce3bb600d5cb3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                b00d7721767b717b3337b5c6dade4ebf2d56345e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                464KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c084d6f6ba40534fbfc5a64b21ef99ab

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000873001\random333.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                162B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1b7c22a214949975556626d7217e9a39

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                4568f01beecde7da90031897af161569

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0760f3477bea16b74b9821f0b788efccd0b3cfd9

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                67f8eb8e1dcae4635b3655a107821c37c659a361adaf378c9b8784dfe0c3bece92696ee6020296a1f33237b9ed6bc8acf39274b8ef59675f6680a5e6e8e71d8a

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                541KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                3b069f3dd741e4360f26cb27cb10320a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6a9503aaf1e297f2696482ddf1bd4605a8710101

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                85a15f080b09acace350ab30460c8996

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                315KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5fe67781ffe47ec36f91991abf707432

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                137e6d50387a837bf929b0da70ab6b1512e95466

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                a8f1ae296787ddc24e0e7a241d0bc5829631c98a5eb186a8cfd5795c6d287db9

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                0e32d9a72b562d4c4a8c4edbd3d0ece54b67ee87c8ac382c6508c62b04b11a2dcd1fba23c3a78004fcd0c2b623dc854fd2fd82eb372dc7becdcbdd7ec7fe1b68

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                350KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                04df085b57814d1a1accead4e153909e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6d277da314ef185ba9072a9b677b599b1f46c35b

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                91a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                413KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d467222c3bd563cb72fa49302f80b079

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9335e2a36abb8309d8a2075faf78d66b968b2a91

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                297KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                cc1e287519f78a28dab6bde8e1093829

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9262753386caa4054aa845d918364e964e5505aa

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                dbcb61ce94c4d2d216de2b503937a2a964b984577f2d7730b7c6428b2b5e8db2

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                527b6d905e2ca829369563baa7be9eaf4050ef9bbf438ccc98b9b821e76977aaebbda8471da8b81c0542395c5fc316b19d7034155f278640d0765bfc55dc1f43

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.1MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c59b5442a81703579cded755bddcc63e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                c3e36a8ed0952db30676d5cf77b3671238c19272

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                cac7fc4ae9c97eba7455992b2d41449ee257ec485c562bfc7245a90033b1d774

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c9c834860982652e7ec1db085e534f6b1c35298ce75b29c2cbb0ac04ff40cd64363b458bcbd8c0983cf1ed778a4269372c6bc4ce7f831a6e1e70ee5f4a0772f9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.9MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                fa572ba75130804b14c18a0b3b7bd882

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                842f7dca2999bdf6f7ecf036d2635a3b2cf4681a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ba7cbacdf3a26eb0351275d64a048475e5cb5c82f96760716fc7f75cf9c643aa

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                296e4b9d321d7fd193b00050a47b58db2af9acfb6b69fd2a20c649f6c29a441729501639bbd792b5fac30e6eb9d387d56966d389437edbe4f61dd5e89db87a3b

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.1MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                62c3c730ab9fbf17ed6a041ab31b20a1

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                72d621ca9cae2a6860561e6ce6a7636501d95236

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                992b4246e47709cc303c1928d752240f3eefa115258180537840080d6feb7dd5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                3b4b900773855d5e2f11c78d39260ae4c9846ddab016dd05cd62a5ad16ac05ffa030f112cb94251015e83ec8a7c937a35c12a832e53307cd226291c4d271b519

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                418KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\B532.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                e69125300a060d1eb870d352de33e4c3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                60f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403241905057305220.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                56d5557063ce2d3b79b89f67a8dc18c9

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                2e3e83a5f7db1dcec4058ae202100a3ae85cf3db

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                bc3302b36bb81c9235aa15e533edc0aaa41f4d7dd448ad36645f60904c68eb5d

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                9646e1b9c3225c448bdeb44c05cab90f7d5f2781fc1e640fc2fa04613ae2fa3b4d66b7ee7009c3d3c0d87f9d643badcbd0ad83cfc78b91d9b62f59f20ef4fbf8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Tmp4A43.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nzikqhoi.h1i.ps1

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                60B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\u3qg.0.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                291KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                bca9f45d45410be3485717c7eb4320e4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                41d6a52b47d5251176d78e39eea0915186bfc49e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                1a55c2c2e090256a83f5913fc1548a35fba33d5e6d411bd2486e52217acdb113

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                3d95a4789eacb46b079d8c12fc330bb10619d01d27b851206a08247fab3b6d1c768914baf2675abe0348cd616cfbf9d2028d855015fc260d70749c72934563f8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\u3qg.1.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                eee5ddcffbed16222cac0a1b4e2e466e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                109KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                2afdbe3b99a4736083066a13e4b5d11a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                92fbdfccf6a63acef2743631d16652a7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                971968b1378dd89d59d7f84bf92f16fc68664506

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                109KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                726cd06231883a159ec1ce28dd538699

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                15a42d3e4579da615a384c717ab2109b

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                109KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                154c3f1334dd435f562672f2664fea6b

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                f35b671fda2603ec30ace10946f11a90

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                059ad6b06559d4db581b1879e709f32f80850872

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                541KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1fc4b9014855e9238a361046cfbf6d66

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                304KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                cc90e3326d7b20a33f8037b9aab238e4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                236d173a6ac462d85de4e866439634db3b9eeba3

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                                                                                                                                              • C:\Users\Admin\Pictures\43Q4HuuIt9GagH0n8GdiJ9Tf.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                896KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                02b9ffb69d78d82fb79572530522e05b

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0f09ef6a4bde81b251ea823f65ebca2c3fad646f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                2cc209cb162f976ff79e4ccfc34bfa01481e93ca35018482aa14e9c7625931e4

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2a09dad2968c360feeb739d6bca1b8240184aeb902b3aeaa77d6a486e3b8d2d50ee1fd520a83551f5d70bf50ecb98fa6007d0cbc09cf18b891d037d5bfbd70d2

                                                                                                                                                                                              • C:\Users\Admin\Pictures\7O3dSTs2dLeoTzKoxYIQwGZr.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0679d0eb0fceb9129ae97c33bc7bdaf8

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                220d4e6c7a5eecc1e2feaa2e17260c88603858cb

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c758236d84d041c717bf308c3a1e665d1a712f867a2f58dc884c16bab1835506

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                85e68f63021580d981c237ab427d1f2bfdad373747ee3c86fa953f1be0662661a37da0862414645a1f78055d00a7ce1beabfbe385dbe1623469fa21ed61fa888

                                                                                                                                                                                              • C:\Users\Admin\Pictures\DmF0sDr4KSynCGpaPp21SjsN.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                cdc880b95e818844a2fc5de4db1eaec7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                7002e15f23bd1e6498e9557e6b9676aba49f4b6e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                531ae2f2a925a794ae990ece441ed81e8b9c184a5290c58e4507856bbf811e78

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                659c9f8ad52c4baf8ad66940d924fc23ac36eb4cf1dbf77896a7bf2ab2addc0f8743b137161a8a68ada66f7067961109407f91afd14f9fac415be71ad61ed0ba

                                                                                                                                                                                              • C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.6MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                fccc0c01a9d8dea12560a398336b61ef

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                99c63a61fdbccd084e3368dca73c6c2c2ff9485c

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e7cbdd01b2b58f98eed6114965907d4617213c8197af7bbcdff9dfd845736ffd

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                96fcfb2dd21a943c84402b729a09ae422e6d4c200ef3996154e33bd9cfafe1c0273e9ed13f48fd8c6b7cd0f221fb22e1bd1d2fea3cb36d0203f2180283abf319

                                                                                                                                                                                              • C:\Users\Admin\Pictures\DpBqJ8858UcnVoU9c1DCENSb.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9687ce3f3f7ada5cdc6c692476e199c3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                c343b7943e549bcbac4cb199bc35ec32a3d3e041

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                44065a3f685e43592cc9b7881bb0757fe908be4942d61900f645f18d9df21a77

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                791526d094d89b9fff9836ed6caaf60af73574d46246f0977a0717726e278b22b70bc15529c6c61d73280830f516d09b8979c624fed327da5054c99e2c6c369d

                                                                                                                                                                                              • C:\Users\Admin\Pictures\LzLpZG0OTRnk8eOQMSIByzzn.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                314KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                167f83d78c1b85f0bda119d96abf2002

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                66f8332c0686dd040cf521f04dd6662d9053977d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d49a3b37978e3d683475b49ac4374f054a943bf674819b4e6a7d4ba6f52cf082

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1d5dbbb61ed3586348a37c076a93b4b2b3781dd3d3cace99378dab4433ea3f62dbaffd282570bb31fbb6f774b095aea96f149cd3cfc838542ed58c1577bbdc8d

                                                                                                                                                                                              • C:\Users\Admin\Pictures\PTvD7cn247OKbmt3lKGLCQCP.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d46bb3f202e9c1e2c62547ff44689cd8

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d6cefb981ba060bcba8d2f0f90d7bfc0e7cfdda1

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c79fe159881c0671c281648baf8fe80b878d81c4cee2de19cfed4d7712046775

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d213cc77bbf6e391ebbea701ab1f2b173c7a5fe326c1a50f295df0d6e69f43787c280e7ae5f6219c6b63732f74f34a9d45f809229319b3b53ce595e4631cea2d

                                                                                                                                                                                              • C:\Users\Admin\Pictures\QQHPttB7Ptp7ZyFPulifRUQx.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                436KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                23c80cf3c864384f8cc01cb46188531a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                adee1474c797b1ca5654d8c0cef9182a9784a888

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                51695af669927b81ff90f13ecd63423b8868042de06ec20969b0c9ce59b0229c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                805de8a09553b66f145525b853c53fad739314070e4ed1b23bd9ad53f5d3d74542ef47ae63d4cb29603e4c269a096c5eb95cf6ab1717783e8712256e8a281d9f

                                                                                                                                                                                              • C:\Users\Admin\Pictures\Y9y0JACAyQ1vzo3wfPmlA47g.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                8b3e43ad780188b1da5306eaee1a2a52

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                727210a5d805a3c74e193471c8ec00a10dcd7abe

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                123053106f95fe866fc4aa6b1075c9d3a6b518a66b914b956b3d30cdd7334394

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                64fe64d1cc74e090613f2ea9a2253e253a337671ab74763531829d16117f63486914e10a82ca9aa48d5c416fe87a01e1fe2a0ed520a9085487079b2e44a2e7e2

                                                                                                                                                                                              • C:\Users\Admin\Pictures\l1HfS5JH7jziqvZgVdfcKzzC.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                f21c6b67dd2e330a29deb47d7faac82d

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d90c346dbec04affd140491d3ac38ab7af5aaa3a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                acc0f456ad3e51aebab137dd01a18d325a279603da9b85c469b40d6c89c433e7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                82c8d42b27772a3f8ecefbaf389243a4a91466545a100bace6a4573bac0ad2107517fe822db10195a46bd493cdf4d51548f31215e0a7b72041d8917ad7125842

                                                                                                                                                                                              • C:\Users\Admin\Pictures\sKcyeGml9PngArF8Qn8q1Mtk.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.2MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                713189f5d55bc389bd091cdb46beb969

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                7122090b2540d4fa3d890134410103603416da44

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f5b7efd3fa4f3668576ebf34b254bea492eef7e7ea3fef119c4203f49e463a6e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                74015e0a5b8eaa550148f8e6e35358fb610f6d46a0fa08b010370ca6bce441809443fb399d69fa22821b5fbe23359e24299065da33c56c94960e612f4600b1b5

                                                                                                                                                                                              • C:\Users\Admin\Pictures\sZll9bsbvaM4jdZFQBuCRYKh.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                522KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                b8616322186dcdf78032a74cf3497153

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                bf1c1568d65422757cc88300df76a6740db6eab5

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                43dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                7b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb

                                                                                                                                                                                              • C:\Users\Admin\Pictures\y0oHggq82RUlHWhKIdInIgMP.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                436KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5b3ec438cbce7c8dfad05aec92b7821c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5ffad2442079c7ccf601c1419d86b35a37bd1b6e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                31dd0ddd1d4e95fe971f1ad96e943c0c1904831923fd586a75c1de4dc72710e6

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                52e6b67dee87553417766e850b6805f83e46a37c0f72849206d16a14dd24766a3ed90be1da19332125e67d33af8aa35981bc6780048d2fb13d3efcdd783cdc74

                                                                                                                                                                                              • C:\Users\Admin\Pictures\yK3rlkVFPouPT9kDFYCwxnz8.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5b423612b36cde7f2745455c5dd82577

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                                                                                              • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                127B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                              • memory/64-52-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                288KB

                                                                                                                                                                                              • memory/64-55-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                288KB

                                                                                                                                                                                              • memory/64-59-0x00000000016C0000-0x00000000016C1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/64-123-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                288KB

                                                                                                                                                                                              • memory/64-60-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                288KB

                                                                                                                                                                                              • memory/524-266-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.6MB

                                                                                                                                                                                              • memory/760-801-0x00007FFCEBF30000-0x00007FFCEC125000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.0MB

                                                                                                                                                                                              • memory/760-823-0x0000000076580000-0x0000000076795000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.1MB

                                                                                                                                                                                              • memory/760-796-0x0000000003700000-0x0000000003B00000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.0MB

                                                                                                                                                                                              • memory/760-798-0x0000000003700000-0x0000000003B00000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.0MB

                                                                                                                                                                                              • memory/760-741-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                436KB

                                                                                                                                                                                              • memory/760-729-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                436KB

                                                                                                                                                                                              • memory/1272-58-0x0000000073680000-0x0000000073E30000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/1272-136-0x00000000028C0000-0x00000000048C0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32.0MB

                                                                                                                                                                                              • memory/1272-48-0x0000000073680000-0x0000000073E30000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/1272-47-0x00000000003F0000-0x000000000047C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                560KB

                                                                                                                                                                                              • memory/1272-49-0x0000000004E80000-0x0000000004E90000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/1272-57-0x00000000028C0000-0x00000000048C0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32.0MB

                                                                                                                                                                                              • memory/1380-138-0x00000276DDDB0000-0x00000276DDDC2000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                72KB

                                                                                                                                                                                              • memory/1380-134-0x00007FFCCC330000-0x00007FFCCCDF1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10.8MB

                                                                                                                                                                                              • memory/1380-145-0x00007FFCCC330000-0x00007FFCCCDF1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10.8MB

                                                                                                                                                                                              • memory/1380-139-0x00000276DD350000-0x00000276DD35A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/1380-129-0x00000276DDC40000-0x00000276DDC62000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                136KB

                                                                                                                                                                                              • memory/1380-137-0x00000276DD320000-0x00000276DD330000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/1380-135-0x00000276DD320000-0x00000276DD330000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/2076-166-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-168-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-162-0x00000000005E0000-0x0000000000A8B000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/2076-170-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-163-0x00000000005E0000-0x0000000000A8B000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/2076-164-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-169-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-165-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2076-185-0x00000000005E0000-0x0000000000A8B000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/2076-167-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-88-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-26-0x0000000005380000-0x0000000005381000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-356-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-81-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-25-0x0000000005370000-0x0000000005371000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-103-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-840-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-21-0x00000000053A0000-0x00000000053A1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-20-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-27-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-22-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-23-0x0000000005390000-0x0000000005391000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-222-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-19-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-478-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/2936-24-0x00000000053D0000-0x00000000053D1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/2936-578-0x0000000000AC0000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/3096-91-0x0000000002E90000-0x0000000004E90000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32.0MB

                                                                                                                                                                                              • memory/3096-85-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/3096-90-0x0000000072D50000-0x0000000073500000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/3096-83-0x0000000072D50000-0x0000000073500000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/3096-80-0x0000000000BA0000-0x0000000000C1A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                488KB

                                                                                                                                                                                              • memory/3232-16-0x0000000000900000-0x0000000000DCE000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/3232-8-0x0000000005420000-0x0000000005421000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-0-0x0000000000900000-0x0000000000DCE000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/3232-1-0x0000000077A74000-0x0000000077A76000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                              • memory/3232-2-0x0000000000900000-0x0000000000DCE000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.8MB

                                                                                                                                                                                              • memory/3232-3-0x0000000005430000-0x0000000005431000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-4-0x0000000005410000-0x0000000005411000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-5-0x0000000005460000-0x0000000005461000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-6-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-10-0x0000000005480000-0x0000000005481000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-7-0x0000000005400000-0x0000000005401000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-11-0x0000000005470000-0x0000000005471000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3232-9-0x0000000005450000-0x0000000005451000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/3608-433-0x0000000002510000-0x0000000002526000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                88KB

                                                                                                                                                                                              • memory/3812-889-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-892-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-886-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-883-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-881-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-878-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/3812-875-0x00007FF6902F0000-0x00007FF690CD0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9.9MB

                                                                                                                                                                                              • memory/4504-520-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32KB

                                                                                                                                                                                              • memory/4620-86-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                320KB

                                                                                                                                                                                              • memory/4620-105-0x00000000056B0000-0x00000000056BA000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/4620-108-0x0000000008280000-0x0000000008292000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                72KB

                                                                                                                                                                                              • memory/4620-109-0x00000000082E0000-0x000000000831C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                240KB

                                                                                                                                                                                              • memory/4620-110-0x0000000008330000-0x000000000837C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                304KB

                                                                                                                                                                                              • memory/4620-94-0x0000000005500000-0x0000000005592000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                584KB

                                                                                                                                                                                              • memory/4620-107-0x0000000008390000-0x000000000849A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.0MB

                                                                                                                                                                                              • memory/4620-106-0x0000000006A00000-0x0000000007018000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6.1MB

                                                                                                                                                                                              • memory/4620-92-0x0000000072D50000-0x0000000073500000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/4620-104-0x0000000005710000-0x0000000005720000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/4620-171-0x0000000006450000-0x00000000064B6000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                408KB

                                                                                                                                                                                              • memory/4620-93-0x00000000059B0000-0x0000000005F54000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.6MB

                                                                                                                                                                                              • memory/4840-870-0x0000000000400000-0x0000000000B16000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.1MB

                                                                                                                                                                                              • memory/4940-776-0x0000000000350000-0x00000000007FB000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/4940-260-0x0000000000350000-0x00000000007FB000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/4940-441-0x0000000000350000-0x00000000007FB000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/4940-507-0x0000000000350000-0x00000000007FB000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.7MB

                                                                                                                                                                                              • memory/5132-434-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                41.3MB

                                                                                                                                                                                              • memory/5200-780-0x0000000010000000-0x0000000010239000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.2MB

                                                                                                                                                                                              • memory/5344-864-0x0000000000400000-0x0000000000ED5000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10.8MB

                                                                                                                                                                                              • memory/5684-839-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                972KB

                                                                                                                                                                                              • memory/6040-828-0x00000000025E0000-0x00000000029E0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.0MB

                                                                                                                                                                                              • memory/6040-824-0x0000000000580000-0x0000000000589000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                36KB

                                                                                                                                                                                              • memory/6040-831-0x00007FFCEBF30000-0x00007FFCEC125000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.0MB

                                                                                                                                                                                              • memory/6040-834-0x0000000076580000-0x0000000076795000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.1MB

                                                                                                                                                                                              • memory/6116-406-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                296KB

                                                                                                                                                                                              • memory/6116-402-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                296KB