Analysis

  • max time kernel
    88s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2024 04:48

General

  • Target

    127644d5a83056c3382ba984ee43cb8885b5b2bbc67a2d7bed237f7420c332f5.exe

  • Size

    1.8MB

  • MD5

    252a2313b72c0d8629380aa03371d152

  • SHA1

    141b3e296b4e88404de5cabd43f827872184ff99

  • SHA256

    127644d5a83056c3382ba984ee43cb8885b5b2bbc67a2d7bed237f7420c332f5

  • SHA512

    b43982fa99af43f3f67a4d7a459db6ee3fd81f646b9ed4ccc7a36b73ac12b189c2abc0d657505c1a4b100ddc2b2a41a72e7be12e7ab6982066aa6e077f64e98e

  • SSDEEP

    49152:drjxQ9zbx9UkHFNg91jiLSy50j+tM8ODlQGaCulIFRTiR8:dry9X349hiuymKaL3ulIzG

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://enthusiasimtitleow.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Detected google phishing page
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 22 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 10 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127644d5a83056c3382ba984ee43cb8885b5b2bbc67a2d7bed237f7420c332f5.exe
    "C:\Users\Admin\AppData\Local\Temp\127644d5a83056c3382ba984ee43cb8885b5b2bbc67a2d7bed237f7420c332f5.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Users\Admin\AppData\Local\Temp\1000042001\c96cf91b75.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\c96cf91b75.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:2320
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
          PID:3908
        • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
          "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4612
        • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:2116
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5116
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              5⤵
                PID:4716
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\360119756166_Desktop.zip' -CompressionLevel Optimal
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:416
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:5416
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3432
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:3364
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:196
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3044
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:2384
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:4960
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:2328
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:5992
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:5600
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:5460
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:5148
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:5320
      • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
        C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5328
        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
          "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          PID:5756
        • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
          "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4724
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:3196
              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5392
              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:5448
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                4⤵
                  PID:7580
                  • C:\Windows\SysWOW64\choice.exe
                    choice /C Y /N /D Y /T 3
                    5⤵
                      PID:2612
              • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
                "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
                2⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:5388
              • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
                2⤵
                • Executes dropped EXE
                PID:5684
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                2⤵
                • Loads dropped DLL
                PID:3980
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                  3⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2444
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    4⤵
                      PID:3188
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\360119756166_Desktop.zip' -CompressionLevel Optimal
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2612
                • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                  "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:6120
                • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                  "C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:6132
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3336
                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                  "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:5524
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:6116
                  • C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2868
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6648
                      • C:\Users\Admin\Pictures\iGm3t3q3Dn0mrVYJACDBM55N.exe
                        "C:\Users\Admin\Pictures\iGm3t3q3Dn0mrVYJACDBM55N.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:5580
                        • C:\Users\Admin\AppData\Local\Temp\u4b0.0.exe
                          "C:\Users\Admin\AppData\Local\Temp\u4b0.0.exe"
                          6⤵
                            PID:7116
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\DHDHJJJECF.exe"
                              7⤵
                                PID:260
                                • C:\Users\Admin\AppData\Local\Temp\DHDHJJJECF.exe
                                  "C:\Users\Admin\AppData\Local\Temp\DHDHJJJECF.exe"
                                  8⤵
                                    PID:4732
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\DHDHJJJECF.exe
                                      9⤵
                                        PID:3660
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping 2.2.2.2 -n 1 -w 3000
                                          10⤵
                                          • Runs ping.exe
                                          PID:7580
                                • C:\Users\Admin\AppData\Local\Temp\u4b0.1.exe
                                  "C:\Users\Admin\AppData\Local\Temp\u4b0.1.exe"
                                  6⤵
                                    PID:6540
                                    • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                                      "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                                      7⤵
                                        PID:7908
                                  • C:\Users\Admin\Pictures\3TGILAbD6qXljYDm9om2Irf1.exe
                                    "C:\Users\Admin\Pictures\3TGILAbD6qXljYDm9om2Irf1.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:2020
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      6⤵
                                        PID:7696
                                      • C:\Users\Admin\Pictures\3TGILAbD6qXljYDm9om2Irf1.exe
                                        "C:\Users\Admin\Pictures\3TGILAbD6qXljYDm9om2Irf1.exe"
                                        6⤵
                                          PID:3168
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            7⤵
                                              PID:6260
                                            • C:\Windows\System32\cmd.exe
                                              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                              7⤵
                                                PID:5856
                                                • C:\Windows\system32\netsh.exe
                                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                  8⤵
                                                  • Modifies Windows Firewall
                                                  PID:3584
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                7⤵
                                                  PID:7428
                                                  • C:\Windows\System32\Conhost.exe
                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    8⤵
                                                      PID:6588
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    7⤵
                                                      PID:7252
                                                • C:\Users\Admin\Pictures\6zHjVg1znkjeRsVoskfak4xz.exe
                                                  "C:\Users\Admin\Pictures\6zHjVg1znkjeRsVoskfak4xz.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:6520
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    6⤵
                                                      PID:7776
                                                    • C:\Users\Admin\Pictures\6zHjVg1znkjeRsVoskfak4xz.exe
                                                      "C:\Users\Admin\Pictures\6zHjVg1znkjeRsVoskfak4xz.exe"
                                                      6⤵
                                                        PID:7416
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          7⤵
                                                            PID:6604
                                                          • C:\Windows\System32\cmd.exe
                                                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                            7⤵
                                                              PID:7772
                                                              • C:\Windows\system32\netsh.exe
                                                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                8⤵
                                                                • Modifies Windows Firewall
                                                                PID:8188
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -nologo -noprofile
                                                              7⤵
                                                                PID:7432
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -nologo -noprofile
                                                                7⤵
                                                                  PID:6448
                                                                • C:\Windows\rss\csrss.exe
                                                                  C:\Windows\rss\csrss.exe
                                                                  7⤵
                                                                    PID:7304
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell -nologo -noprofile
                                                                      8⤵
                                                                        PID:7228
                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                        8⤵
                                                                        • Creates scheduled task(s)
                                                                        PID:6464
                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                        schtasks /delete /tn ScheduledUpdate /f
                                                                        8⤵
                                                                          PID:7468
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell -nologo -noprofile
                                                                          8⤵
                                                                            PID:6312
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -nologo -noprofile
                                                                            8⤵
                                                                              PID:7488
                                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                                              8⤵
                                                                                PID:6864
                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                                8⤵
                                                                                • Creates scheduled task(s)
                                                                                PID:5624
                                                                              • C:\Windows\windefender.exe
                                                                                "C:\Windows\windefender.exe"
                                                                                8⤵
                                                                                  PID:7664
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                                    9⤵
                                                                                      PID:5752
                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                                        10⤵
                                                                                        • Launches sc.exe
                                                                                        PID:6344
                                                                            • C:\Users\Admin\Pictures\tOCRuXedAPkT1v6watyTKifI.exe
                                                                              "C:\Users\Admin\Pictures\tOCRuXedAPkT1v6watyTKifI.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              PID:6588
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell -nologo -noprofile
                                                                                6⤵
                                                                                  PID:7784
                                                                                • C:\Users\Admin\Pictures\tOCRuXedAPkT1v6watyTKifI.exe
                                                                                  "C:\Users\Admin\Pictures\tOCRuXedAPkT1v6watyTKifI.exe"
                                                                                  6⤵
                                                                                    PID:5864
                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell -nologo -noprofile
                                                                                      7⤵
                                                                                        PID:6516
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                                                        7⤵
                                                                                          PID:4552
                                                                                          • C:\Windows\system32\netsh.exe
                                                                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                                            8⤵
                                                                                            • Modifies Windows Firewall
                                                                                            PID:8072
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell -nologo -noprofile
                                                                                          7⤵
                                                                                            PID:7964
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -nologo -noprofile
                                                                                            7⤵
                                                                                              PID:5380
                                                                                        • C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe
                                                                                          "C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe" --silent --allusers=0
                                                                                          5⤵
                                                                                            PID:4956
                                                                                            • C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe
                                                                                              C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.35 --initial-client-data=0x280,0x2a4,0x2a8,0x250,0x2ac,0x6adde1d0,0x6adde1dc,0x6adde1e8
                                                                                              6⤵
                                                                                                PID:7076
                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cJgVP8evokgOCWzwtHRkeA4Q.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cJgVP8evokgOCWzwtHRkeA4Q.exe" --version
                                                                                                6⤵
                                                                                                  PID:6640
                                                                                                • C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe
                                                                                                  "C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4956 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240401044944" --session-guid=22688dfd-9195-496d-a291-84800ea0fb20 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=B404000000000000
                                                                                                  6⤵
                                                                                                    PID:3140
                                                                                                    • C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe
                                                                                                      C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.35 --initial-client-data=0x2ac,0x2b0,0x2b4,0x27c,0x2b8,0x6a26e1d0,0x6a26e1dc,0x6a26e1e8
                                                                                                      7⤵
                                                                                                        PID:3732
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"
                                                                                                      6⤵
                                                                                                        PID:7668
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\assistant_installer.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\assistant_installer.exe" --version
                                                                                                        6⤵
                                                                                                          PID:7732
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\assistant_installer.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x24c,0x250,0x254,0x228,0xac,0x300040,0x30004c,0x300058
                                                                                                            7⤵
                                                                                                              PID:5700
                                                                                                        • C:\Users\Admin\Pictures\LgKXXvQU8hX0eN1XLRT8Vxnh.exe
                                                                                                          "C:\Users\Admin\Pictures\LgKXXvQU8hX0eN1XLRT8Vxnh.exe"
                                                                                                          5⤵
                                                                                                            PID:5304
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                                          4⤵
                                                                                                            PID:6676
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        PID:3772
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                          3⤵
                                                                                                            PID:3680
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                            3⤵
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:5792
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 808
                                                                                                            3⤵
                                                                                                            • Program crash
                                                                                                            PID:5852
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe"
                                                                                                          2⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          PID:6200
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                            3⤵
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:6556
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 784
                                                                                                            3⤵
                                                                                                            • Program crash
                                                                                                            PID:6572
                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                                                                                          2⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          • Loads dropped DLL
                                                                                                          PID:6880
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                        1⤵
                                                                                                          PID:7244
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                          1⤵
                                                                                                            PID:7272
                                                                                                          • \??\c:\windows\system32\svchost.exe
                                                                                                            c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                                            1⤵
                                                                                                              PID:7428
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                              1⤵
                                                                                                                PID:7436
                                                                                                              • C:\Windows\system32\browser_broker.exe
                                                                                                                C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:7500
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                  1⤵
                                                                                                                    PID:3960
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                    1⤵
                                                                                                                      PID:6496
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                      1⤵
                                                                                                                        PID:8120
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                        1⤵
                                                                                                                          PID:6548
                                                                                                                        • C:\Windows\windefender.exe
                                                                                                                          C:\Windows\windefender.exe
                                                                                                                          1⤵
                                                                                                                            PID:8076
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                            1⤵
                                                                                                                              PID:316
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                                                                              1⤵
                                                                                                                                PID:7972

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\ProgramData\Are.docx

                                                                                                                                Filesize

                                                                                                                                11KB

                                                                                                                                MD5

                                                                                                                                a33e5b189842c5867f46566bdbf7a095

                                                                                                                                SHA1

                                                                                                                                e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                                                SHA256

                                                                                                                                5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                                                SHA512

                                                                                                                                f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                                Filesize

                                                                                                                                593KB

                                                                                                                                MD5

                                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                SHA1

                                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                SHA256

                                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                SHA512

                                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                94855049590df2a11123e4b4dfb202a0

                                                                                                                                SHA1

                                                                                                                                60934db6289c32668291284f4024608874fc4901

                                                                                                                                SHA256

                                                                                                                                6a050ffa045a5aa2214f5452b3a580e33c0d488eeec2cffd76cf5a656ede0e2a

                                                                                                                                SHA512

                                                                                                                                7c6e93423e2fab8e3536add6b3d5df552541afbb0a95d6fb8f1c5f4f7882ea549a84ef00cd66f4c5765bdb80d36749db165e64456d8059e1c7368185d6b5579e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\53V85Y29\edgecompatviewlist[1].xml

                                                                                                                                Filesize

                                                                                                                                74KB

                                                                                                                                MD5

                                                                                                                                d4fc49dc14f63895d997fa4940f24378

                                                                                                                                SHA1

                                                                                                                                3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                                                                                                SHA256

                                                                                                                                853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                                                                                                SHA512

                                                                                                                                cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                d33d3558ce11ee2cdbb923b3fbe67648

                                                                                                                                SHA1

                                                                                                                                88cfeacbbe4199c0f92794f67daf774052e93d95

                                                                                                                                SHA256

                                                                                                                                c403b5fdc5cf5483a3b7178816f78f7d7eab4163d3070f3dc09e1b386ec1ff5b

                                                                                                                                SHA512

                                                                                                                                f4a2b6acbf6d4de2beff174cd835f7833aff8f251923655d6e00af8d364ebae11ebd27c76abdf65ff216c69226c6e790a9387829c4e41207b6ae1614442effa7

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\1RFZY8SO\favicon[1].ico

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                f3418a443e7d841097c714d69ec4bcb8

                                                                                                                                SHA1

                                                                                                                                49263695f6b0cdd72f45cf1b775e660fdc36c606

                                                                                                                                SHA256

                                                                                                                                6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                                                                                                                                SHA512

                                                                                                                                82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HK81OTXC\4Kv5U5b1o3f[1].png

                                                                                                                                Filesize

                                                                                                                                610B

                                                                                                                                MD5

                                                                                                                                a81a5e7f71ae4153e6f888f1c92e5e11

                                                                                                                                SHA1

                                                                                                                                39c3945c30abff65b372a7d8c691178ae9d9eee0

                                                                                                                                SHA256

                                                                                                                                2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

                                                                                                                                SHA512

                                                                                                                                1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HLFRUONM\suggestions[1].en-US

                                                                                                                                Filesize

                                                                                                                                17KB

                                                                                                                                MD5

                                                                                                                                5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                SHA1

                                                                                                                                3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                SHA256

                                                                                                                                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                SHA512

                                                                                                                                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\0TSHUIT6.cookie

                                                                                                                                Filesize

                                                                                                                                132B

                                                                                                                                MD5

                                                                                                                                8939ffea0f115b5df8f2b85ff8f1b2dd

                                                                                                                                SHA1

                                                                                                                                f6f72135b55440ab16578deb67de96190e15ef3c

                                                                                                                                SHA256

                                                                                                                                a0d6f61dd3e9296531c4cdfd3c6a1e5cf238fa96922698e9600dd03d3085fb30

                                                                                                                                SHA512

                                                                                                                                62f2751e4f5e47567e0729dacd59f89b3a1a4a37de4a4858bda3e2e95e1e09df0f0aa105ca65aa4fc13c39b6d576e2d1ad6f2dc2df3322fc7326fd1992921451

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\F31CD3YE.cookie

                                                                                                                                Filesize

                                                                                                                                314B

                                                                                                                                MD5

                                                                                                                                a1a276d97ec5063f45ead4a34c5dcfc5

                                                                                                                                SHA1

                                                                                                                                416191a5101b646e4015b1e46f85697a274fb7e2

                                                                                                                                SHA256

                                                                                                                                14b9f7aef8f2a2a90a35f92dd09da9525f700557ca19e10966b50ff1f57741d1

                                                                                                                                SHA512

                                                                                                                                c10dd7ffbc630f69aa3bfe46ce90cc4b9b2587dbbf5ca2e50b74154531e1f8569ed05fa0371a9fdb1aa510372f65eddf077c5007b563ba0bcd50926b8c589ea3

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                f5d38a6b4d7dd26226946210bd98974e

                                                                                                                                SHA1

                                                                                                                                a76e96f9ed6df8e812d14b52ef4bbdb2a484964c

                                                                                                                                SHA256

                                                                                                                                131c777ed9d52e3945245f4c17159eb1b636542d04705284173e893b264de187

                                                                                                                                SHA512

                                                                                                                                47c8cb5ca742ff4dabaa44062c33c41fc5c549de8836f0b8e17f4bea4494c6ab0f93cfd361b68223fd2c75cd21b11526701c8c800ddc6ba7b389bf9ef3b96c41

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                                MD5

                                                                                                                                1bfe591a4fe3d91b03cdf26eaacd8f89

                                                                                                                                SHA1

                                                                                                                                719c37c320f518ac168c86723724891950911cea

                                                                                                                                SHA256

                                                                                                                                9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                                                                                                                                SHA512

                                                                                                                                02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                                                                                Filesize

                                                                                                                                724B

                                                                                                                                MD5

                                                                                                                                ac89a852c2aaa3d389b2d2dd312ad367

                                                                                                                                SHA1

                                                                                                                                8f421dd6493c61dbda6b839e2debb7b50a20c930

                                                                                                                                SHA256

                                                                                                                                0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                                                                                                                                SHA512

                                                                                                                                c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_9E23C1D3BC042F285396F92A9773D1F3

                                                                                                                                Filesize

                                                                                                                                471B

                                                                                                                                MD5

                                                                                                                                e6601fcfd9d1dd4954a7701bc414508e

                                                                                                                                SHA1

                                                                                                                                66ce069378c406388209ff43b76215fc262b2c68

                                                                                                                                SHA256

                                                                                                                                5ba7c9591a4e9014f7ceb6111b48db1a55fb333b693885a2be7f13ea4d92af79

                                                                                                                                SHA512

                                                                                                                                339a2a8391a70b6aa704bfb53fdd3105b9a286648a99cd84192fbf6171ce8eb4f34ac147af81a376ab69ade5f61a421d4e11d848d533d2af9d85de243d2fd394

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                                                                Filesize

                                                                                                                                410B

                                                                                                                                MD5

                                                                                                                                094d30366733a5ee68d38af2b3b6e357

                                                                                                                                SHA1

                                                                                                                                6629a25e3fde84ef1439d7d3f13120ab0d3afe0d

                                                                                                                                SHA256

                                                                                                                                d94951af3d4f87f6d608eb0792b83af8cfbfd80474c55a85757d1125e15d32f5

                                                                                                                                SHA512

                                                                                                                                254a8fbd4a8d749bd366b249fcf930a987269e626cdaa4c267e5e7891a2359bf9c93ee2daa4ff539536ce2c2f92be5e46f508243110f7822469e8dc26aa3f873

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                Filesize

                                                                                                                                338B

                                                                                                                                MD5

                                                                                                                                7c82436140e6ccad94ac8c330b66f8be

                                                                                                                                SHA1

                                                                                                                                c75bc36b1ba98494642968df17f7fb65ff95e1e4

                                                                                                                                SHA256

                                                                                                                                d487aa6e72a7bd648f3e34e5f35a6b3ff70c8fd190462e16e8e72be1f8e6a2af

                                                                                                                                SHA512

                                                                                                                                038ba04ce0d1c5969e4fd057658bdb9bd9ecc1f1fb67246d6f4349394db4ce4de233c8fb82daea5ad76297b037241db78896b5963093a500b0d7f39c44f9e711

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                                                                                Filesize

                                                                                                                                392B

                                                                                                                                MD5

                                                                                                                                8ab9cd8816b487a5bcd451b280fd36a1

                                                                                                                                SHA1

                                                                                                                                8a703b0a806dada2ca926d9ec2e24f900572649d

                                                                                                                                SHA256

                                                                                                                                b5d59faa370cd579e8a7080cb19b8c2d9fcfb39fd2d546683d22b21640d54064

                                                                                                                                SHA512

                                                                                                                                57f5ad72a1ce229d6845acd5045d221417d2d4ead17d110e0a17bbe6bbdccd16af84bba139c9640fa3a88dd4c8cda48e5b699999c449276d307ba87c401f9937

                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_9E23C1D3BC042F285396F92A9773D1F3

                                                                                                                                Filesize

                                                                                                                                406B

                                                                                                                                MD5

                                                                                                                                3c54937ed1ed5621ed3eb2d4b60f5d6e

                                                                                                                                SHA1

                                                                                                                                874bc6933a38aae53ba36f0f0e265e69525191cb

                                                                                                                                SHA256

                                                                                                                                3f1a0b53d5fd90406a0b68ed13319a6a9e4f16b0a24ff5c261f88f19a43698f0

                                                                                                                                SHA512

                                                                                                                                b617afdc9a55e3568fdab52bbb64d43cfa2c888cf5968789262650c450f6edd8d47edbdba912cc603b0c06b7e9f567e630e552ed2634106d5ff80e927c2bca1b

                                                                                                                              • C:\Users\Admin\AppData\Local\RCum37xLTEwzkc1RXTJaVxBf.exe

                                                                                                                                Filesize

                                                                                                                                4.2MB

                                                                                                                                MD5

                                                                                                                                95bcd0984e0c5df0663d6fffdfbefe58

                                                                                                                                SHA1

                                                                                                                                f87c1c6703592be91f43c1e60caff29f4a41f8c6

                                                                                                                                SHA256

                                                                                                                                5cb7c6eafa1793471b5a6606b202256a5f207b8d870f19f2d53853eb91bc74e0

                                                                                                                                SHA512

                                                                                                                                9ea6d76797566fe1a786120ebde0f8e33ac97f8a6bba973ca4d2b87bf3b6bb95c951e844451f8be1defebaee2ca986da921e28f49ce3eef527e19ef15d264ce7

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\additional_file0.tmp

                                                                                                                                Filesize

                                                                                                                                2.5MB

                                                                                                                                MD5

                                                                                                                                20d293b9bf23403179ca48086ba88867

                                                                                                                                SHA1

                                                                                                                                dedf311108f607a387d486d812514a2defbd1b9e

                                                                                                                                SHA256

                                                                                                                                fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348

                                                                                                                                SHA512

                                                                                                                                5d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404010449441\opera_package

                                                                                                                                Filesize

                                                                                                                                103.9MB

                                                                                                                                MD5

                                                                                                                                401c352990789be2f40fe8f9c5c7a5ac

                                                                                                                                SHA1

                                                                                                                                d7c1e902487511d3f4e1a57abdee8a94d5483ed4

                                                                                                                                SHA256

                                                                                                                                f62f4ebc7eca46d9cddfb02cc0305da5efdd6f3601fb0f53da555e19558869a3

                                                                                                                                SHA512

                                                                                                                                efc6d4224e3721e91efb2ea8f4b74685cba607260c69d08eac26866c52b8127080a42799d9f76ab1661b8ca63c946fcf35dddf0a63ab3cd258ea44a27dd769c8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                                MD5

                                                                                                                                252a2313b72c0d8629380aa03371d152

                                                                                                                                SHA1

                                                                                                                                141b3e296b4e88404de5cabd43f827872184ff99

                                                                                                                                SHA256

                                                                                                                                127644d5a83056c3382ba984ee43cb8885b5b2bbc67a2d7bed237f7420c332f5

                                                                                                                                SHA512

                                                                                                                                b43982fa99af43f3f67a4d7a459db6ee3fd81f646b9ed4ccc7a36b73ac12b189c2abc0d657505c1a4b100ddc2b2a41a72e7be12e7ab6982066aa6e077f64e98e

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000042001\c96cf91b75.exe

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                                MD5

                                                                                                                                516770743e65a07e2d0ec72025fd8668

                                                                                                                                SHA1

                                                                                                                                849f7aaae19a504518d375c92c5026b3f0c25911

                                                                                                                                SHA256

                                                                                                                                a3011027eb8c7672f1d540ef4e5cb07542c5884beb3764cf2b1571e4274b5911

                                                                                                                                SHA512

                                                                                                                                732091361020474320c793a4b87ab1856e6c9a5a0126246bbacf59a01a80168c590853cf2cc802132d392186964906c0225052e1a755b6ac87b8927f13c4da17

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe

                                                                                                                                Filesize

                                                                                                                                894KB

                                                                                                                                MD5

                                                                                                                                2f8912af892c160c1c24c9f38a60c1ab

                                                                                                                                SHA1

                                                                                                                                d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                                                                                                SHA256

                                                                                                                                59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                                                                                                SHA512

                                                                                                                                0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                                MD5

                                                                                                                                e5749e3d5ee5eaca5052e737f8963d79

                                                                                                                                SHA1

                                                                                                                                ef60077563e3f0c169766b751ec6b4618ebb39b6

                                                                                                                                SHA256

                                                                                                                                b1d107ad03eebe9dea02a53578c223f5af87dd4c81d1520bbb40c04ce326dd2e

                                                                                                                                SHA512

                                                                                                                                7ce79e3f4b2f1b97e2e375299a3cc450e954f5ea97f444999103ca2c436f6e48c185c1675800a71ab793f7ce6725a8a1a11cc3ebf9a9261d800e381e80bbed6a

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe

                                                                                                                                Filesize

                                                                                                                                379KB

                                                                                                                                MD5

                                                                                                                                b264fee6ed0c634983be2b7ea4f854e6

                                                                                                                                SHA1

                                                                                                                                f125a58da078e64b0bccc7012e341eefbe67ed0b

                                                                                                                                SHA256

                                                                                                                                b443e71c000e0750a88e821dfcc804c8357a5017c12fa3e71256c486d93c6362

                                                                                                                                SHA512

                                                                                                                                0ee197acf5e2c46657ab85959baf5b3d194b28bc266c3dd1373a331654d7ab7b5abfe796910a6856d4833d26ddcbfa45a3d00a03664f349cc47c0f31dcfcc1ee

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                85a15f080b09acace350ab30460c8996

                                                                                                                                SHA1

                                                                                                                                3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                                                                                SHA256

                                                                                                                                3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                                                                                SHA512

                                                                                                                                ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                                MD5

                                                                                                                                2beec974eceb18cf841a4478d8010f58

                                                                                                                                SHA1

                                                                                                                                00256c5ef7935d57609f5c650a74fe22bc9a4f94

                                                                                                                                SHA256

                                                                                                                                b88322cd121a87058ba3df1623d4a3dcca79f80b0b4f6e033eedca8f9854af8c

                                                                                                                                SHA512

                                                                                                                                664d71bb4a68640c2dc6c78d3b5f128fd1de0364df4f8bcccaee5eb80987676da29932f2ee27a2a3eb08ebcfb1140319b3607c0f9114e4937f711267d567b7e1

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe

                                                                                                                                Filesize

                                                                                                                                301KB

                                                                                                                                MD5

                                                                                                                                832eb4dc3ed8ceb9a1735bd0c7acaf1b

                                                                                                                                SHA1

                                                                                                                                b622a406927fbb8f6cd5081bd4455fb831948fca

                                                                                                                                SHA256

                                                                                                                                2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                                                                                                                                SHA512

                                                                                                                                3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe

                                                                                                                                Filesize

                                                                                                                                499KB

                                                                                                                                MD5

                                                                                                                                83d0b41c7a3a0d29a268b49a313c5de5

                                                                                                                                SHA1

                                                                                                                                46f3251c771b67b40b1f3268caef8046174909a5

                                                                                                                                SHA256

                                                                                                                                09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                                                                                                                                SHA512

                                                                                                                                705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe

                                                                                                                                Filesize

                                                                                                                                464KB

                                                                                                                                MD5

                                                                                                                                c084d6f6ba40534fbfc5a64b21ef99ab

                                                                                                                                SHA1

                                                                                                                                0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                                                                                                SHA256

                                                                                                                                afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                                                                                                SHA512

                                                                                                                                a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe

                                                                                                                                Filesize

                                                                                                                                418KB

                                                                                                                                MD5

                                                                                                                                0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                SHA1

                                                                                                                                0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                SHA256

                                                                                                                                919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                SHA512

                                                                                                                                5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe

                                                                                                                                Filesize

                                                                                                                                321KB

                                                                                                                                MD5

                                                                                                                                1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                                                                SHA1

                                                                                                                                33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                                                                SHA256

                                                                                                                                e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                                                                SHA512

                                                                                                                                53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe

                                                                                                                                Filesize

                                                                                                                                379KB

                                                                                                                                MD5

                                                                                                                                90f41880d631e243cec086557cb74d63

                                                                                                                                SHA1

                                                                                                                                cb385e4172cc227ba72baf29ca1c4411fa99a26d

                                                                                                                                SHA256

                                                                                                                                23b62a27e3f5c424b16f31e5009af4f24c8bd13b1f035f87879e2a29236be7a0

                                                                                                                                SHA512

                                                                                                                                eeb85b34aa66a7e9a1b1807012999ee439433df23126a52ffa8d4b3cb2026be3bcf63ca25f143de58ba929c0d4feeaf2a603fd6ec6b5379fc48147c22f3783e3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404010449408116640.dll

                                                                                                                                Filesize

                                                                                                                                4.6MB

                                                                                                                                MD5

                                                                                                                                117176ddeaf70e57d1747704942549e4

                                                                                                                                SHA1

                                                                                                                                75e3ab6b3469d93cce9ea2f7e22b71b987ccdf2b

                                                                                                                                SHA256

                                                                                                                                3c5b34de987116a4d3240e319c0da89a951c96b81e6705476a0fea27b22b20af

                                                                                                                                SHA512

                                                                                                                                ca2a356929c92d314aab63d7f3b246d72783212dfa3a4507f28d41a51ca0eedc78e85b1cd453aa8e02c12509f847a0216bb702154f903291c804c8a98ec378b9

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TmpDCEE.tmp

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                SHA1

                                                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                SHA256

                                                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                SHA512

                                                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5iseiwh2.jr0.ps1

                                                                                                                                Filesize

                                                                                                                                1B

                                                                                                                                MD5

                                                                                                                                c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                SHA1

                                                                                                                                356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                SHA256

                                                                                                                                6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                SHA512

                                                                                                                                4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                ba013ed9bcfdf4539bc40181290cfd80

                                                                                                                                SHA1

                                                                                                                                a0a5a43c545633094abe827b5bcfadbf09e99b5d

                                                                                                                                SHA256

                                                                                                                                e5b8d53a92002c0e3433d39a665bd7ae7d5c3ca95b29fdda75eb39b6f7cb0829

                                                                                                                                SHA512

                                                                                                                                156c438e23a54dd9a01af32dc1a607d2247de114c1dc9806ce1340f41570df71ff977ad3f65bbabe65de4676a73baace56a621cf588ce131e16e5cfb69514bba

                                                                                                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                                                                                                Filesize

                                                                                                                                109KB

                                                                                                                                MD5

                                                                                                                                2afdbe3b99a4736083066a13e4b5d11a

                                                                                                                                SHA1

                                                                                                                                4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                                                                                                SHA256

                                                                                                                                8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                                                                                                SHA512

                                                                                                                                d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                                                                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                                MD5

                                                                                                                                92fbdfccf6a63acef2743631d16652a7

                                                                                                                                SHA1

                                                                                                                                971968b1378dd89d59d7f84bf92f16fc68664506

                                                                                                                                SHA256

                                                                                                                                b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                                                                                                SHA512

                                                                                                                                b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                Filesize

                                                                                                                                109KB

                                                                                                                                MD5

                                                                                                                                726cd06231883a159ec1ce28dd538699

                                                                                                                                SHA1

                                                                                                                                404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                                                                SHA256

                                                                                                                                12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                                                                SHA512

                                                                                                                                9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                                MD5

                                                                                                                                15a42d3e4579da615a384c717ab2109b

                                                                                                                                SHA1

                                                                                                                                22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                                                                SHA256

                                                                                                                                3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                                                                SHA512

                                                                                                                                1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                                                              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                                                                                Filesize

                                                                                                                                541KB

                                                                                                                                MD5

                                                                                                                                1fc4b9014855e9238a361046cfbf6d66

                                                                                                                                SHA1

                                                                                                                                c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                                                                                SHA256

                                                                                                                                f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                                                                                SHA512

                                                                                                                                2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                                                                              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                                                                                Filesize

                                                                                                                                304KB

                                                                                                                                MD5

                                                                                                                                cc90e3326d7b20a33f8037b9aab238e4

                                                                                                                                SHA1

                                                                                                                                236d173a6ac462d85de4e866439634db3b9eeba3

                                                                                                                                SHA256

                                                                                                                                bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                                                                                SHA512

                                                                                                                                b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                                                                              • C:\Users\Admin\Pictures\GidY8RHmKZL8FHsirnjVk67s.exe

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                d111a08dc7ff1fe9fce7c7da7dcdebd1

                                                                                                                                SHA1

                                                                                                                                8291410cedc526c5769331290a90602aa28f8161

                                                                                                                                SHA256

                                                                                                                                5dfc617f19f0a30bb0ec909e65e2df797c10b6b5a6365c38fc0250f79fae7eba

                                                                                                                                SHA512

                                                                                                                                fe3d24789770e0d44d685f504443851fe9474b6585036fcbbd50d96cfffa19e3f5c2cef28a7b14b0ed69734deaf60b106f4b2a5c2755962ab0afaa74db6d54b2

                                                                                                                              • C:\Users\Admin\Pictures\YxGcpJmv7Cwg0n4zkSCRDNcv.exe

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                c4c39d9e7d68e8028ee260732dd5e884

                                                                                                                                SHA1

                                                                                                                                17695f9f55d7d5fd1703e686dea25290ac861d63

                                                                                                                                SHA256

                                                                                                                                11c24cd8f6b018745db145a50a6f83e712a996a45609810be6bfb91ccdf58785

                                                                                                                                SHA512

                                                                                                                                eefc3a8c52324069282def4a929ff3dcfadbb1fbca232458a34c8ac0fdf491d41870b6e65236df30dc5899e2fa6b33c5c6e7cbc2ebcf75b89b11b0ab6f5b106c

                                                                                                                              • C:\Users\Admin\Pictures\cJgVP8evokgOCWzwtHRkeA4Q.exe

                                                                                                                                Filesize

                                                                                                                                5.1MB

                                                                                                                                MD5

                                                                                                                                356948b91abf5bd5fd287f627a2c7bd8

                                                                                                                                SHA1

                                                                                                                                3a3747295171c46886e965f4ba6ca53f92058e7c

                                                                                                                                SHA256

                                                                                                                                b210fe822cc821eca84cd8987757929abb7312dedf59b99deaa92af67e72dbb2

                                                                                                                                SHA512

                                                                                                                                d34c6367817c76fee119234d16620105e00ea02031ba09463996558f84a1c72880072ed2669b68ba7e60cb9aa4eb2063fe5880f81b2047b3247affe63d6ceec6

                                                                                                                              • C:\Users\Admin\Pictures\ylJWLLERy1pRM5tp43dW05w6.exe

                                                                                                                                Filesize

                                                                                                                                7KB

                                                                                                                                MD5

                                                                                                                                5b423612b36cde7f2745455c5dd82577

                                                                                                                                SHA1

                                                                                                                                0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                SHA256

                                                                                                                                e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                SHA512

                                                                                                                                c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                              • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                Filesize

                                                                                                                                127B

                                                                                                                                MD5

                                                                                                                                8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                SHA1

                                                                                                                                a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                SHA256

                                                                                                                                9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                SHA512

                                                                                                                                5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                              • memory/416-211-0x000001DE7EC20000-0x000001DE7EC42000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/416-209-0x00007FFD39130000-0x00007FFD39B1C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/416-328-0x000001DE7EE40000-0x000001DE7EE50000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/416-553-0x000001DE7EDF0000-0x000001DE7EE02000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                72KB

                                                                                                                              • memory/416-566-0x000001DE7EC50000-0x000001DE7EC5A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                40KB

                                                                                                                              • memory/416-575-0x00007FFD39130000-0x00007FFD39B1C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/416-221-0x000001DE7EF50000-0x000001DE7EFC6000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/416-210-0x000001DE7EE40000-0x000001DE7EE50000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/416-212-0x000001DE7EE40000-0x000001DE7EE50000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/836-10-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-1-0x0000000077544000-0x0000000077545000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-4-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-6-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-19-0x0000000000F60000-0x0000000001429000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/836-2-0x0000000000F60000-0x0000000001429000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/836-7-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-3-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-8-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-0-0x0000000000F60000-0x0000000001429000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/836-9-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/836-5-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-21-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-121-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-582-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-23-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-25-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-22-0x0000000004C30000-0x0000000004C31000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-118-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-20-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-28-0x0000000004C90000-0x0000000004C91000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-27-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-109-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/1440-26-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-29-0x0000000004C80000-0x0000000004C81000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1440-24-0x0000000004C20000-0x0000000004C21000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-123-0x0000000004A30000-0x0000000004A31000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-113-0x00000000049B0000-0x00000000049B1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-105-0x0000000000830000-0x0000000000CDE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.7MB

                                                                                                                              • memory/2116-110-0x00000000049F0000-0x00000000049F1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-111-0x00000000049E0000-0x00000000049E1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-127-0x0000000000830000-0x0000000000CDE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.7MB

                                                                                                                              • memory/2116-112-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-122-0x0000000004A40000-0x0000000004A41000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-115-0x00000000049C0000-0x00000000049C1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-119-0x0000000000830000-0x0000000000CDE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.7MB

                                                                                                                              • memory/2116-117-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-116-0x0000000004A00000-0x0000000004A01000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2116-114-0x00000000049D0000-0x00000000049D1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2320-640-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2320-639-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2320-42-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2320-586-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2320-193-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2320-44-0x0000000000D90000-0x000000000114A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.7MB

                                                                                                                              • memory/2384-298-0x00000184ADBC0000-0x00000184ADBC2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/2384-286-0x000001849AB10000-0x000001849AB12000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/2384-294-0x00000184ADBB0000-0x00000184ADBB2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/3432-474-0x00000247C82B0000-0x00000247C82B1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/3432-475-0x00000247C82C0000-0x00000247C82C1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/3432-57-0x00000247C1420000-0x00000247C1430000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3432-73-0x00000247C1B00000-0x00000247C1B10000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3432-92-0x00000247C18E0000-0x00000247C18E2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-493-0x0000028D4C0F0000-0x0000028D4C0F2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-513-0x0000028D4D860000-0x0000028D4D862000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-274-0x0000028D4B960000-0x0000028D4BA60000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1024KB

                                                                                                                              • memory/4960-320-0x0000028D4B900000-0x0000028D4B920000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                128KB

                                                                                                                              • memory/4960-453-0x0000028D4AF30000-0x0000028D4AF32000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-466-0x0000028D4C0B0000-0x0000028D4C0B2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-469-0x0000028D4B500000-0x0000028D4B502000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-486-0x0000028D4C0E0000-0x0000028D4C0E2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-496-0x0000028D4D1E0000-0x0000028D4D1E2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-499-0x0000028D4D4F0000-0x0000028D4D4F2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-502-0x0000028D4D760000-0x0000028D4D762000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-506-0x0000028D4D820000-0x0000028D4D822000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-510-0x0000028D4D840000-0x0000028D4D842000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-606-0x0000028D4B900000-0x0000028D4B920000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                128KB

                                                                                                                              • memory/4960-604-0x0000028D4CC00000-0x0000028D4CD00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1024KB

                                                                                                                              • memory/4960-522-0x0000028D4D890000-0x0000028D4D892000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/4960-519-0x0000028D4D880000-0x0000028D4D882000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/5320-684-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-683-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-686-0x0000000004B60000-0x0000000004B61000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-677-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/5320-685-0x0000000004B50000-0x0000000004B51000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-682-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-681-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5320-680-0x00000000002B0000-0x0000000000779000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/5328-692-0x0000000005240000-0x0000000005241000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5328-690-0x0000000005290000-0x0000000005291000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5328-693-0x0000000001220000-0x00000000016CE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.7MB

                                                                                                                              • memory/5328-691-0x0000000005230000-0x0000000005231000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5328-689-0x0000000005250000-0x0000000005251000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5328-687-0x0000000005260000-0x0000000005261000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5328-678-0x0000000001220000-0x00000000016CE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.7MB

                                                                                                                              • memory/5328-688-0x0000000005270000-0x0000000005271000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/5460-646-0x000002136D770000-0x000002136D772000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB