Analysis

  • max time kernel
    76s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-04-2024 12:26

General

  • Target

    bb299b6d3010568be489eab42692932fb6e6faf3779d8e8a14a2e6c4d9f4a0a0.exe

  • Size

    1.8MB

  • MD5

    ff9694ba17631d3034d733d04cc7ae9c

  • SHA1

    9d542c24660becce2cf4700b125be7f3b2858c6f

  • SHA256

    bb299b6d3010568be489eab42692932fb6e6faf3779d8e8a14a2e6c4d9f4a0a0

  • SHA512

    5d36baa2ae96d3f6ab37fd48e7e49eaa218f4544d20cf8a578940e930a04bab50bb5a97259b30a5ceeaeebb2ce0681e59b88482a805446729ebd4da9585384ef

  • SSDEEP

    49152:WLeohRnI2zYpExma1m+oMiGH+0rL0ayHpPS5:DGDHAMzbJHFoPg

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xworm Payload 1 IoCs
  • Detect ZGRat V1 2 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 9 IoCs
  • Modifies firewall policy service 2 TTPs 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb299b6d3010568be489eab42692932fb6e6faf3779d8e8a14a2e6c4d9f4a0a0.exe
    "C:\Users\Admin\AppData\Local\Temp\bb299b6d3010568be489eab42692932fb6e6faf3779d8e8a14a2e6c4d9f4a0a0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:972
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 884
          3⤵
          • Program crash
          PID:3096
      • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
        "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:1968
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4432
            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3756
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
              4⤵
                PID:5960
                • C:\Windows\SysWOW64\choice.exe
                  choice /C Y /N /D Y /T 3
                  5⤵
                    PID:6120
            • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
              "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:5000
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:3912
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 372
                  3⤵
                  • Program crash
                  PID:4176
              • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4028
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:4912
                • C:\Users\Admin\AppData\Local\Temp\1000218001\ISetup8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000218001\ISetup8.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:3948
                  • C:\Users\Admin\AppData\Local\Temp\u31o.0.exe
                    "C:\Users\Admin\AppData\Local\Temp\u31o.0.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:3120
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 1096
                      5⤵
                      • Program crash
                      PID:1768
                  • C:\Users\Admin\AppData\Local\Temp\u31o.1.exe
                    "C:\Users\Admin\AppData\Local\Temp\u31o.1.exe"
                    4⤵
                      PID:2600
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 1408
                      4⤵
                      • Program crash
                      PID:4364
                  • C:\Users\Admin\AppData\Local\Temp\1000219001\toolspub1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000219001\toolspub1.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:3940
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 388
                      4⤵
                      • Program crash
                      PID:4700
                  • C:\Users\Admin\AppData\Local\Temp\1000220001\4767d2e713f2021e8fe856e3ea638b58.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000220001\4767d2e713f2021e8fe856e3ea638b58.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4760
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1020
                    • C:\Users\Admin\AppData\Local\Temp\1000220001\4767d2e713f2021e8fe856e3ea638b58.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000220001\4767d2e713f2021e8fe856e3ea638b58.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      PID:5500
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3180
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                        5⤵
                          PID:4344
                          • C:\Windows\system32\netsh.exe
                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                            6⤵
                            • Modifies Windows Firewall
                            PID:5540
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5780
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3148
                    • C:\Users\Admin\AppData\Local\Temp\1000221001\FirstZ.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000221001\FirstZ.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:2644
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                        4⤵
                          PID:3148
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                          4⤵
                            PID:3548
                            • C:\Windows\system32\wusa.exe
                              wusa /uninstall /kb:890830 /quiet /norestart
                              5⤵
                                PID:4868
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop UsoSvc
                              4⤵
                              • Launches sc.exe
                              PID:2900
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                              4⤵
                              • Launches sc.exe
                              PID:6084
                              • C:\Windows\System32\Conhost.exe
                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                5⤵
                                  PID:1844
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop wuauserv
                                4⤵
                                • Launches sc.exe
                                PID:1128
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop bits
                                4⤵
                                • Launches sc.exe
                                PID:2512
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop dosvc
                                4⤵
                                • Launches sc.exe
                                PID:5920
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                4⤵
                                  PID:5324
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                  4⤵
                                    PID:1424
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                    4⤵
                                      PID:2892
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                      4⤵
                                        PID:2680
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe delete "WSNKISKT"
                                        4⤵
                                        • Launches sc.exe
                                        PID:1264
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"
                                        4⤵
                                        • Launches sc.exe
                                        PID:5492
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop eventlog
                                        4⤵
                                        • Launches sc.exe
                                        PID:5244
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe start "WSNKISKT"
                                        4⤵
                                        • Launches sc.exe
                                        PID:2860
                                  • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1196
                                  • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of WriteProcessMemory
                                    PID:444
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      3⤵
                                        PID:3776
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        3⤵
                                          PID:3608
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          3⤵
                                            PID:924
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3760
                                        • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"
                                          2⤵
                                          • UAC bypass
                                          • Windows security bypass
                                          • Executes dropped EXE
                                          • Windows security modification
                                          • Checks whether UAC is enabled
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of AdjustPrivilegeToken
                                          • System policy modification
                                          PID:956
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vao5cxwm\vao5cxwm.cmdline"
                                            3⤵
                                              PID:2148
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAEDD.tmp" "c:\Users\Admin\AppData\Local\Temp\vao5cxwm\CSC12BFC8ACBEC540F8A3E3E09A3B819E1.TMP"
                                                4⤵
                                                  PID:5116
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4972
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2092
                                                • C:\Users\Admin\Pictures\g3yxtASvpHV6LwvywQk0no7G.exe
                                                  "C:\Users\Admin\Pictures\g3yxtASvpHV6LwvywQk0no7G.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1028
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3096
                                                  • C:\Users\Admin\Pictures\g3yxtASvpHV6LwvywQk0no7G.exe
                                                    "C:\Users\Admin\Pictures\g3yxtASvpHV6LwvywQk0no7G.exe"
                                                    5⤵
                                                    • Windows security bypass
                                                    • Executes dropped EXE
                                                    • Windows security modification
                                                    • Adds Run key to start application
                                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                                    • Drops file in Windows directory
                                                    • Modifies data under HKEY_USERS
                                                    PID:5608
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -nologo -noprofile
                                                      6⤵
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3140
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                      6⤵
                                                        PID:5520
                                                        • C:\Windows\system32\netsh.exe
                                                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                          7⤵
                                                          • Modifies Windows Firewall
                                                          PID:4632
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        6⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:6096
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        6⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4228
                                                      • C:\Windows\rss\csrss.exe
                                                        C:\Windows\rss\csrss.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:1736
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          7⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5920
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                          7⤵
                                                          • Creates scheduled task(s)
                                                          PID:5364
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /delete /tn ScheduledUpdate /f
                                                          7⤵
                                                            PID:5136
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            7⤵
                                                              PID:5380
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -nologo -noprofile
                                                              7⤵
                                                                PID:5284
                                                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                                7⤵
                                                                  PID:1392
                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                  7⤵
                                                                  • Creates scheduled task(s)
                                                                  PID:5712
                                                                • C:\Windows\windefender.exe
                                                                  "C:\Windows\windefender.exe"
                                                                  7⤵
                                                                    PID:4580
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                      8⤵
                                                                        PID:5828
                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                          9⤵
                                                                          • Launches sc.exe
                                                                          PID:5472
                                                              • C:\Users\Admin\Pictures\JGaPHJhvnOvfhi5qPGjVEvJv.exe
                                                                "C:\Users\Admin\Pictures\JGaPHJhvnOvfhi5qPGjVEvJv.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:1640
                                                                • C:\Users\Admin\AppData\Local\Temp\u19k.0.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\u19k.0.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  PID:592
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 1096
                                                                    6⤵
                                                                    • Program crash
                                                                    PID:5544
                                                                • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
                                                                  5⤵
                                                                    PID:2052
                                                                    • C:\Users\Admin\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
                                                                      6⤵
                                                                        PID:5740
                                                                        • C:\Users\Admin\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
                                                                          C:\Users\Admin\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
                                                                          7⤵
                                                                            PID:5556
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\SysWOW64\cmd.exe
                                                                              8⤵
                                                                                PID:1060
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  9⤵
                                                                                    PID:1492
                                                                          • C:\Users\Admin\AppData\Local\Temp\u19k.1.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\u19k.1.exe"
                                                                            5⤵
                                                                              PID:5444
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 1224
                                                                              5⤵
                                                                              • Program crash
                                                                              PID:3092
                                                                          • C:\Users\Admin\Pictures\WwLRDE1Ulv9ab48RrrmxR5Ib.exe
                                                                            "C:\Users\Admin\Pictures\WwLRDE1Ulv9ab48RrrmxR5Ib.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1880
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -nologo -noprofile
                                                                              5⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1160
                                                                            • C:\Users\Admin\Pictures\WwLRDE1Ulv9ab48RrrmxR5Ib.exe
                                                                              "C:\Users\Admin\Pictures\WwLRDE1Ulv9ab48RrrmxR5Ib.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Adds Run key to start application
                                                                              • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:5572
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell -nologo -noprofile
                                                                                6⤵
                                                                                • Drops file in System32 directory
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:1084
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                                                6⤵
                                                                                  PID:2444
                                                                                  • C:\Windows\system32\netsh.exe
                                                                                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                                    7⤵
                                                                                    • Modifies Windows Firewall
                                                                                    PID:2516
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -nologo -noprofile
                                                                                  6⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3392
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -nologo -noprofile
                                                                                  6⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3888
                                                                            • C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe
                                                                              "C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe" --silent --allusers=0
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Enumerates connected drives
                                                                              PID:996
                                                                              • C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe
                                                                                C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2b8,0x2bc,0x2c0,0x294,0x2c4,0x6e83e1d0,0x6e83e1dc,0x6e83e1e8
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                PID:5344
                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\Wt98sPs2zvn5zgrCI5OdnURt.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\Wt98sPs2zvn5zgrCI5OdnURt.exe" --version
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                PID:6000
                                                                              • C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe
                                                                                "C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=996 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240423122746" --session-guid=35f2734d-011b-42f0-a955-38cec9b5e642 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7004000000000000
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                • Enumerates connected drives
                                                                                PID:2116
                                                                                • C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe
                                                                                  C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2b4,0x2c4,0x2c8,0x290,0x2cc,0x6dcee1d0,0x6dcee1dc,0x6dcee1e8
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  PID:5752
                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"
                                                                                5⤵
                                                                                  PID:4628
                                                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\assistant_installer.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\assistant_installer.exe" --version
                                                                                  5⤵
                                                                                    PID:6040
                                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\assistant_installer.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x656038,0x656044,0x656050
                                                                                      6⤵
                                                                                        PID:2076
                                                                                  • C:\Users\Admin\Pictures\NzaXIcSfpaWXyiL22VjJhfgg.exe
                                                                                    "C:\Users\Admin\Pictures\NzaXIcSfpaWXyiL22VjJhfgg.exe"
                                                                                    4⤵
                                                                                    • Modifies firewall policy service
                                                                                    • Windows security bypass
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Windows security modification
                                                                                    • Checks whether UAC is enabled
                                                                                    • Drops file in System32 directory
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    PID:5312
                                                                                  • C:\Users\Admin\Pictures\ajKg7GWbQLc3XCBxjqtPLFvh.exe
                                                                                    "C:\Users\Admin\Pictures\ajKg7GWbQLc3XCBxjqtPLFvh.exe"
                                                                                    4⤵
                                                                                      PID:5168
                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS7536.tmp\Install.exe
                                                                                        .\Install.exe /nxdidQZJ "385118" /S
                                                                                        5⤵
                                                                                          PID:3872
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                            6⤵
                                                                                              PID:5820
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                7⤵
                                                                                                  PID:5368
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                    8⤵
                                                                                                      PID:5244
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                        9⤵
                                                                                                          PID:2312
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 12:30:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\eKdsLxW.exe\" em /rusite_idRxE 385118 /S" /V1 /F
                                                                                                    6⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:3144
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                              3⤵
                                                                                                PID:960
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000207001\explorer.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\1000207001\explorer.exe"
                                                                                              2⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:5056
                                                                                              • C:\Users\Admin\AppData\Roaming\build.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\build.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4416
                                                                                              • C:\Users\Admin\AppData\Roaming\system.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\system.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2328
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\system.exe'
                                                                                                  4⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3372
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
                                                                                                  4⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5860
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\explorer.exe'
                                                                                                  4⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1844
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                                                                                  4⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4584
                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                  4⤵
                                                                                                  • Creates scheduled task(s)
                                                                                                  PID:2900
                                                                                                • C:\Users\Admin\AppData\Local\Temp\rjynhw.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rjynhw.exe"
                                                                                                  4⤵
                                                                                                    PID:2940
                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                                                                2⤵
                                                                                                • Loads dropped DLL
                                                                                                PID:2444
                                                                                                • C:\Windows\system32\rundll32.exe
                                                                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                                                                  3⤵
                                                                                                  • Blocklisted process makes network request
                                                                                                  • Loads dropped DLL
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:1148
                                                                                                  • C:\Windows\system32\netsh.exe
                                                                                                    netsh wlan show profiles
                                                                                                    4⤵
                                                                                                      PID:880
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\718508534211_Desktop.zip' -CompressionLevel Optimal
                                                                                                      4⤵
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:5156
                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                                                                                  2⤵
                                                                                                  • Blocklisted process makes network request
                                                                                                  • Loads dropped DLL
                                                                                                  PID:5744
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3316 -ip 3316
                                                                                                1⤵
                                                                                                  PID:1624
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5000 -ip 5000
                                                                                                  1⤵
                                                                                                    PID:2512
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3940 -ip 3940
                                                                                                    1⤵
                                                                                                      PID:2496
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                      1⤵
                                                                                                        PID:8
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                        1⤵
                                                                                                          PID:5716
                                                                                                        • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                          C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2052
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:4676
                                                                                                        • C:\ProgramData\wikombernizc\reakuqnanrkn.exe
                                                                                                          C:\ProgramData\wikombernizc\reakuqnanrkn.exe
                                                                                                          1⤵
                                                                                                            PID:5216
                                                                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                              2⤵
                                                                                                                PID:944
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                2⤵
                                                                                                                  PID:5648
                                                                                                                  • C:\Windows\system32\wusa.exe
                                                                                                                    wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                    3⤵
                                                                                                                      PID:1808
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                    2⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:5516
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                    2⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:5980
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                    2⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:6124
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    C:\Windows\system32\sc.exe stop bits
                                                                                                                    2⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:4344
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    C:\Windows\system32\sc.exe stop dosvc
                                                                                                                    2⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:5616
                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                    2⤵
                                                                                                                      PID:4992
                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                      2⤵
                                                                                                                        PID:3168
                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                        2⤵
                                                                                                                          PID:5800
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                          2⤵
                                                                                                                            PID:904
                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                            C:\Windows\system32\conhost.exe
                                                                                                                            2⤵
                                                                                                                              PID:4504
                                                                                                                            • C:\Windows\explorer.exe
                                                                                                                              explorer.exe
                                                                                                                              2⤵
                                                                                                                                PID:5936
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 592 -ip 592
                                                                                                                              1⤵
                                                                                                                                PID:1920
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3120 -ip 3120
                                                                                                                                1⤵
                                                                                                                                  PID:5096
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3948 -ip 3948
                                                                                                                                  1⤵
                                                                                                                                    PID:3308
                                                                                                                                  • C:\Windows\windefender.exe
                                                                                                                                    C:\Windows\windefender.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:5148
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1640 -ip 1640
                                                                                                                                      1⤵
                                                                                                                                        PID:5648
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:2180
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                          C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                          1⤵
                                                                                                                                            PID:5552

                                                                                                                                          Network

                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\ProgramData\mozglue.dll

                                                                                                                                            Filesize

                                                                                                                                            593KB

                                                                                                                                            MD5

                                                                                                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                            SHA1

                                                                                                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                            SHA256

                                                                                                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                            SHA512

                                                                                                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            98792f2d1b3d638630fa601df6823aed

                                                                                                                                            SHA1

                                                                                                                                            ee50e507b28f67314752754cce5b2fd3fe739241

                                                                                                                                            SHA256

                                                                                                                                            3f63c900813de99733f162952bb27d374ba2e07d7751965b4de4a557cb4478ce

                                                                                                                                            SHA512

                                                                                                                                            b06c3057f15b00d4d04ac35943e9c2fd44031a72043b79131b0c6a7617ad9c4f2480633bd78ba8d3be61899b5182d2cab6889c0a82e17e9b8a363efed4b69f4b

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            ac4917a885cf6050b1a483e4bc4d2ea5

                                                                                                                                            SHA1

                                                                                                                                            b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                                                                                                                                            SHA256

                                                                                                                                            e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                                                                                                                                            SHA512

                                                                                                                                            092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                            Filesize

                                                                                                                                            19KB

                                                                                                                                            MD5

                                                                                                                                            e92b2896ffdce6d71ed27236e5f663ed

                                                                                                                                            SHA1

                                                                                                                                            6cfcd2d8a7a192266cf593c231d880df2cfe6feb

                                                                                                                                            SHA256

                                                                                                                                            aad6a4201c8bcfad71e7a12cb293bedbc0dc8d0cd0654884563bffbd54bc9e91

                                                                                                                                            SHA512

                                                                                                                                            46ff0fc3d36ab0010e2098b3b26eba27080c2d62cc53f8ac1b9d6048d2a73af8bc67dfc682ed8eff040e4fff72f798d68d2f12c11cc4703cb71c710fd89ff858

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                            Filesize

                                                                                                                                            19KB

                                                                                                                                            MD5

                                                                                                                                            15a41658b00000c64d36a2dd8ea29669

                                                                                                                                            SHA1

                                                                                                                                            7596741ee03cb143288de5e8e1f2b1032199de21

                                                                                                                                            SHA256

                                                                                                                                            f51228001bd425d0e09900aa84a77994f7c859d3b34dd241fbde52d2f994f784

                                                                                                                                            SHA512

                                                                                                                                            f7cc66579c5cfa5064acf60e859c350a1443161893550f2429fc7e4ad4afdae765d3ff2b98a2505c5941938388adb7ff819e447fb2ab56ec49c569cef5b54534

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                            Filesize

                                                                                                                                            944B

                                                                                                                                            MD5

                                                                                                                                            4e8a1cc71855824d7d4ddc70ea1a801f

                                                                                                                                            SHA1

                                                                                                                                            f7f31a172fcc9a1eabbfb079dcd73e402b1be796

                                                                                                                                            SHA256

                                                                                                                                            52954754343982474142ca296230d334f4e9827b5c1c6ff427c0440a0f9f4fd4

                                                                                                                                            SHA512

                                                                                                                                            b1f60ab20f8438ea4a0806c2af24de5e7868077acb3429b58333b96c9899b897c3d00d492e64208c4d8023e83069329b1c2b3875c43c8283f3d73a6054d4f87a

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                            Filesize

                                                                                                                                            944B

                                                                                                                                            MD5

                                                                                                                                            854ef6b4d7c119c1bd95dc33c34b433c

                                                                                                                                            SHA1

                                                                                                                                            6a72b508b110570c7a5602a6fd8cd750567af7be

                                                                                                                                            SHA256

                                                                                                                                            e66bdbfb65094ef1d324fe4b75c35df31f6237333fdfc59a4a792ed6abda9749

                                                                                                                                            SHA512

                                                                                                                                            6525cc5043718fe30bd19528411b9957283661c7923392c7f5b8ec1090e85c10c5a49510d505c28c6e530a2a5ee80a7119ac25cc4b84f3eeb9b2b6c26a61e5ec

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\additional_file0.tmp

                                                                                                                                            Filesize

                                                                                                                                            2.5MB

                                                                                                                                            MD5

                                                                                                                                            15d8c8f36cef095a67d156969ecdb896

                                                                                                                                            SHA1

                                                                                                                                            a1435deb5866cd341c09e56b65cdda33620fcc95

                                                                                                                                            SHA256

                                                                                                                                            1521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8

                                                                                                                                            SHA512

                                                                                                                                            d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404231227461\opera_package

                                                                                                                                            Filesize

                                                                                                                                            103.9MB

                                                                                                                                            MD5

                                                                                                                                            4936231c48634b100429f03ad2da9441

                                                                                                                                            SHA1

                                                                                                                                            ad9d994173ceaf384ce808b12f7d10563ecd8a1d

                                                                                                                                            SHA256

                                                                                                                                            c5b7fcc93b1ed8b24f3c7be9d736401f2ac8c5fcaa270092a58d735f5630f3a7

                                                                                                                                            SHA512

                                                                                                                                            45c86456b42c64524729a2ad3f2b058eafff733200f376e7e346a84bea9b0e55641dbdb22a7c79622bad1b993a4b7b26e741f6848b61f84382b4e3e464407a66

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                                                                                                                            Filesize

                                                                                                                                            321KB

                                                                                                                                            MD5

                                                                                                                                            1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                                                                            SHA1

                                                                                                                                            33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                                                                            SHA256

                                                                                                                                            e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                                                                            SHA512

                                                                                                                                            53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                                                                                                                            Filesize

                                                                                                                                            1.7MB

                                                                                                                                            MD5

                                                                                                                                            85a15f080b09acace350ab30460c8996

                                                                                                                                            SHA1

                                                                                                                                            3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                                                                                            SHA256

                                                                                                                                            3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                                                                                            SHA512

                                                                                                                                            ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                                                                                                                            Filesize

                                                                                                                                            460KB

                                                                                                                                            MD5

                                                                                                                                            b22521fb370921bb5d69bf8deecce59e

                                                                                                                                            SHA1

                                                                                                                                            3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                                                                                                                            SHA256

                                                                                                                                            b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                                                                                                                            SHA512

                                                                                                                                            1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                                                                                                                            Filesize

                                                                                                                                            418KB

                                                                                                                                            MD5

                                                                                                                                            0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                            SHA1

                                                                                                                                            0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                            SHA256

                                                                                                                                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                            SHA512

                                                                                                                                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                            MD5

                                                                                                                                            8510bcf5bc264c70180abe78298e4d5b

                                                                                                                                            SHA1

                                                                                                                                            2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                                                                                                            SHA256

                                                                                                                                            096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                                                                                                            SHA512

                                                                                                                                            5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                                                                                                                            Filesize

                                                                                                                                            158KB

                                                                                                                                            MD5

                                                                                                                                            586f7fecacd49adab650fae36e2db994

                                                                                                                                            SHA1

                                                                                                                                            35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                                                                                                            SHA256

                                                                                                                                            cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                                                                                                            SHA512

                                                                                                                                            a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe

                                                                                                                                            Filesize

                                                                                                                                            850KB

                                                                                                                                            MD5

                                                                                                                                            021b6c96fe692e2bb8d4b0d02e9133b0

                                                                                                                                            SHA1

                                                                                                                                            4ff05288024aef4f289c22e4e6985f82c29e49d5

                                                                                                                                            SHA256

                                                                                                                                            ff477a862bd6e5acebe92887a6f221418da1995dfb0abed8527e21fda9b8950b

                                                                                                                                            SHA512

                                                                                                                                            afc29e105225f8f92c74b8ead1df10bedbf6c795cad72c53a6ce6237b71d3f73e346cd6e0116c6a380f7d07e79fa5007e63df8dfe414d0c7816aaf5828cea482

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000207001\explorer.exe

                                                                                                                                            Filesize

                                                                                                                                            153KB

                                                                                                                                            MD5

                                                                                                                                            c1367e0a51d368198b014287172f8dca

                                                                                                                                            SHA1

                                                                                                                                            0d2a002989b3c4494e45af19a0f15e934c5c8376

                                                                                                                                            SHA256

                                                                                                                                            1ec428773f74cd93c4f5e407e49d2c441cdd16d72aa7735ea68e1a38de354bb7

                                                                                                                                            SHA512

                                                                                                                                            2216b48678146e495737cd4c318ea644774cc3de019255adcba141fa0a907f12f4d907555585e4fae10a3f6961a222fb55244374e0405a800a9d550fa6fef255

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000218001\ISetup8.exe

                                                                                                                                            Filesize

                                                                                                                                            462KB

                                                                                                                                            MD5

                                                                                                                                            da5de5db70f0e41ba07d93809c555831

                                                                                                                                            SHA1

                                                                                                                                            d1089b904ed4e5e717ca507acb621553b3d429cf

                                                                                                                                            SHA256

                                                                                                                                            819903410e1374952db28e2b8af63e59de5f2d2a4c3d9fe13fe453a19b2a89cb

                                                                                                                                            SHA512

                                                                                                                                            7a81c8c7cf24154bbd527e5ba52298dc76ccc8f7ef6a9900c7258eb16df5b516242520375fafd67f50abda47b302d83a387a579cad10d06f4e7bfb49cc07412a

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000219001\toolspub1.exe

                                                                                                                                            Filesize

                                                                                                                                            283KB

                                                                                                                                            MD5

                                                                                                                                            ace2b92a3208dec19577cbac84d543b2

                                                                                                                                            SHA1

                                                                                                                                            c40b8908ebbfa819c3581ec85bfca66bca77b605

                                                                                                                                            SHA256

                                                                                                                                            1d5fe89aae579ea253d121deb90c9a61f94ddab13ff51f58f939a57f0edab73e

                                                                                                                                            SHA512

                                                                                                                                            e7e6244087d993ae9beac2fba78452c3eb55f52cbcf515a5888e6078d87f235f1f54c12408eb4d0457102d22a8aa18d069dda0788cce72b0b456a74f7439459f

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000220001\4767d2e713f2021e8fe856e3ea638b58.exe

                                                                                                                                            Filesize

                                                                                                                                            4.2MB

                                                                                                                                            MD5

                                                                                                                                            2af77f8ec96e690ca5166d8ff270cf79

                                                                                                                                            SHA1

                                                                                                                                            9c2492b43b1d84e95e89cca9da2b83d961083163

                                                                                                                                            SHA256

                                                                                                                                            33aad789427d2bd907ae0f67ba6dd4d361c1acb3d24cfb055a5990db423ef2e1

                                                                                                                                            SHA512

                                                                                                                                            e08e8fc854b6323be920f41a0f8d23919ec1aa0e6c748797fc75ccde865bd34ed65835992aa66cc236b070c5c2bcaeff03dc6187d50314167ff307e6982eaacf

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000221001\FirstZ.exe

                                                                                                                                            Filesize

                                                                                                                                            2.5MB

                                                                                                                                            MD5

                                                                                                                                            ffada57f998ed6a72b6ba2f072d2690a

                                                                                                                                            SHA1

                                                                                                                                            6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

                                                                                                                                            SHA256

                                                                                                                                            677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

                                                                                                                                            SHA512

                                                                                                                                            1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                                                                                                                            Filesize

                                                                                                                                            1.8MB

                                                                                                                                            MD5

                                                                                                                                            ff9694ba17631d3034d733d04cc7ae9c

                                                                                                                                            SHA1

                                                                                                                                            9d542c24660becce2cf4700b125be7f3b2858c6f

                                                                                                                                            SHA256

                                                                                                                                            bb299b6d3010568be489eab42692932fb6e6faf3779d8e8a14a2e6c4d9f4a0a0

                                                                                                                                            SHA512

                                                                                                                                            5d36baa2ae96d3f6ab37fd48e7e49eaa218f4544d20cf8a578940e930a04bab50bb5a97259b30a5ceeaeebb2ce0681e59b88482a805446729ebd4da9585384ef

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\5dd3c889

                                                                                                                                            Filesize

                                                                                                                                            6.8MB

                                                                                                                                            MD5

                                                                                                                                            15fe0c4c282df938f0ae415334fc8d11

                                                                                                                                            SHA1

                                                                                                                                            0b97fa302ed3f3c2b5dbb2dc8f0386e578ebc14d

                                                                                                                                            SHA256

                                                                                                                                            ee44025db5ad03b33944bf734f6f256d8b996e89f2ec22197c1767fbae70853d

                                                                                                                                            SHA512

                                                                                                                                            fae66f89bc0007d59570a87ef815295a9499299086bbd2418dd17176c814a9ffc4559fc99b9fa2a1ec14e9d18b4206ce406cc483f04691f3a644cb6a84f932b5

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404231227463316000.dll

                                                                                                                                            Filesize

                                                                                                                                            4.6MB

                                                                                                                                            MD5

                                                                                                                                            cb9f8ac8c123de6ef018cd36e39d4a61

                                                                                                                                            SHA1

                                                                                                                                            30733f7b86743531636affc6e0394f9c3189b3d0

                                                                                                                                            SHA256

                                                                                                                                            ea03fe24040a07d65144d51bc06535b2d5104cfc761934e8d2e6c12887f11481

                                                                                                                                            SHA512

                                                                                                                                            11d4b2f2eb43258d26dbcb6e0f11a941685491e42eda38a3a628e31d278f346b559f7b407ab658163d01a7576e57a49462b156073c71d8eb6621bf25dbd7b1ae

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

                                                                                                                                            Filesize

                                                                                                                                            8.1MB

                                                                                                                                            MD5

                                                                                                                                            54d53f5bdb925b3ed005a84b5492447f

                                                                                                                                            SHA1

                                                                                                                                            e3f63366d0cc19d48a727abf1954b5fc4e69035a

                                                                                                                                            SHA256

                                                                                                                                            4d97e95f172cf1821ec078a6a66d78369b45876abe5e89961e39c5c4e5568d68

                                                                                                                                            SHA512

                                                                                                                                            f6a5b88e02e8f4cb45f8aae16a6297d6f0f355a5e5eaf2cbbe7c313009e8778d1a36631122c6d2bcfea4833c2f22dfd488142b6391b9266c32d3205575a8ff72

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RESAEDD.tmp

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            69fec385cc8a318b003538bf6cc8ced5

                                                                                                                                            SHA1

                                                                                                                                            97cb180d374a599747f0188a3ba18e28a3409893

                                                                                                                                            SHA256

                                                                                                                                            7500289f56bc36896e5240b14731a4a48321e7927dc097ae0dd2b4d38e84059c

                                                                                                                                            SHA512

                                                                                                                                            ffc62584a18b58ded2f2fa4f6d26b8401c70ddc91a59fbc04e95dd50304a68306459caa5ec3f27a34895235ef85acb545c8342e82184e8de98e0e625bf0d937b

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Tmp7C92.tmp

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                            SHA1

                                                                                                                                            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                            SHA256

                                                                                                                                            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                            SHA512

                                                                                                                                            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bej4i5j3.4ko.ps1

                                                                                                                                            Filesize

                                                                                                                                            60B

                                                                                                                                            MD5

                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                            SHA1

                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                            SHA256

                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                            SHA512

                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            9b0e3394285c6c8527a5f288f2fab5ff

                                                                                                                                            SHA1

                                                                                                                                            098a4074b980cf8d5cfb7cb40d3e209aa32ecc3d

                                                                                                                                            SHA256

                                                                                                                                            c8cfa04221b8c8dd594a6a0623f7f044fcad87892406411a577d6e4d4da4baee

                                                                                                                                            SHA512

                                                                                                                                            6f6c4f93a50cc85e0dfbc49f567ec2a6ec738eaf3b4cdd79978e910e722e8c36d066eec3002e15422b6539ad33439bc5887c2d9cf3540e16084c12c882f8dc58

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            eb48b0c9d0815533303c0c54859f8530

                                                                                                                                            SHA1

                                                                                                                                            aacb1970b6a1712c356ec9cd33d75ea6341b057d

                                                                                                                                            SHA256

                                                                                                                                            cd9f4a702d9a16da62078325ace6497b043087c5b1fd01d11e973df2307111f3

                                                                                                                                            SHA512

                                                                                                                                            02936829cde06f355a57b3fa4cb1a1830962f7ae969a182a1990488322db42d97f00f3e772d02751679c87e4e3ed608ab90aa5fc9c94184807805a9868e2d87e

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                            MD5

                                                                                                                                            d54795898ed19379facfe7f902f47f01

                                                                                                                                            SHA1

                                                                                                                                            c153c24522332e16c3972506877933107d4d2ea8

                                                                                                                                            SHA256

                                                                                                                                            c0821e73aeec21653c2c70c312cf7f7ebb6c0e916b9c0efeb01f65ade143ac4b

                                                                                                                                            SHA512

                                                                                                                                            cbaa924dcff64367cef79f106c4a9ca04929310c6586a37f6e61bb0368f405465b0191fe2761e836b6c87f9b6cbc5be52ab85725d8202cd5cb516aa36967c001

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tktxutoxmj

                                                                                                                                            Filesize

                                                                                                                                            993B

                                                                                                                                            MD5

                                                                                                                                            1f5a026f8ed8ec5d1346618b80832ad4

                                                                                                                                            SHA1

                                                                                                                                            95907a756423e8bad09283b6897cee01aa9def5d

                                                                                                                                            SHA256

                                                                                                                                            af4df0dc9c115cd86e032c476fa06a29651343b98c46e8b80855d3b0ea403dad

                                                                                                                                            SHA512

                                                                                                                                            84993da15bedeb32c8889187248b7e1cb175ea14f59756582b5f2c5405ea04e95447344be3237d5ea938311145da640489a441438c8e3864d3ed832e6937ce16

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp12D3.tmp

                                                                                                                                            Filesize

                                                                                                                                            20KB

                                                                                                                                            MD5

                                                                                                                                            42c395b8db48b6ce3d34c301d1eba9d5

                                                                                                                                            SHA1

                                                                                                                                            b7cfa3de344814bec105391663c0df4a74310996

                                                                                                                                            SHA256

                                                                                                                                            5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

                                                                                                                                            SHA512

                                                                                                                                            7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDE98.tmp

                                                                                                                                            Filesize

                                                                                                                                            46KB

                                                                                                                                            MD5

                                                                                                                                            8f5942354d3809f865f9767eddf51314

                                                                                                                                            SHA1

                                                                                                                                            20be11c0d42fc0cef53931ea9152b55082d1a11e

                                                                                                                                            SHA256

                                                                                                                                            776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                                                                                                                            SHA512

                                                                                                                                            fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDEED.tmp

                                                                                                                                            Filesize

                                                                                                                                            100KB

                                                                                                                                            MD5

                                                                                                                                            9c31029ee202128d6d60e9b70e600a8f

                                                                                                                                            SHA1

                                                                                                                                            f2aa6248e74f2d78d49de9b47a43afba8d52b7ec

                                                                                                                                            SHA256

                                                                                                                                            af74414cd78d6d5d2ad88785fbb7a52ec6035bbfe0aa95b4171cd7f2f8000176

                                                                                                                                            SHA512

                                                                                                                                            a34adb87e985687745570cbe1e8622daf84230a6ce9080a230ab553de29e22456455dfa5270ee054da2ff33e2d0b40196dd366e0ed4daaffb707b08c685ac7df

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF28.tmp

                                                                                                                                            Filesize

                                                                                                                                            46KB

                                                                                                                                            MD5

                                                                                                                                            14ccc9293153deacbb9a20ee8f6ff1b7

                                                                                                                                            SHA1

                                                                                                                                            46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                                                                                                                                            SHA256

                                                                                                                                            3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                                                                                                                                            SHA512

                                                                                                                                            916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF2E.tmp

                                                                                                                                            Filesize

                                                                                                                                            20KB

                                                                                                                                            MD5

                                                                                                                                            22be08f683bcc01d7a9799bbd2c10041

                                                                                                                                            SHA1

                                                                                                                                            2efb6041cf3d6e67970135e592569c76fc4c41de

                                                                                                                                            SHA256

                                                                                                                                            451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457

                                                                                                                                            SHA512

                                                                                                                                            0eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF34.tmp

                                                                                                                                            Filesize

                                                                                                                                            112KB

                                                                                                                                            MD5

                                                                                                                                            87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                            SHA1

                                                                                                                                            3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                            SHA256

                                                                                                                                            eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                            SHA512

                                                                                                                                            f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF50.tmp

                                                                                                                                            Filesize

                                                                                                                                            96KB

                                                                                                                                            MD5

                                                                                                                                            d367ddfda80fdcf578726bc3b0bc3e3c

                                                                                                                                            SHA1

                                                                                                                                            23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                                                                                            SHA256

                                                                                                                                            0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                                                                                            SHA512

                                                                                                                                            40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\u31o.0.exe

                                                                                                                                            Filesize

                                                                                                                                            317KB

                                                                                                                                            MD5

                                                                                                                                            f4e3f20f4efd7763376238cca5f08f37

                                                                                                                                            SHA1

                                                                                                                                            57754365c9da15b5b17f9e491aaaf76692543f0f

                                                                                                                                            SHA256

                                                                                                                                            548b531842ea7e853cab55046954a3c3173a71ccf5792ac0bdf8e0c5b40357c8

                                                                                                                                            SHA512

                                                                                                                                            5314ddeaf5e51afeb20131190e466d0ee23130fb6790ced8e231aa67d85cf7b89b11b9f74936b9df598e0cc5ea46da9ec2e0678dcf39af3d69481ae65d62df06

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\u31o.1.exe

                                                                                                                                            Filesize

                                                                                                                                            4.6MB

                                                                                                                                            MD5

                                                                                                                                            397926927bca55be4a77839b1c44de6e

                                                                                                                                            SHA1

                                                                                                                                            e10f3434ef3021c399dbba047832f02b3c898dbd

                                                                                                                                            SHA256

                                                                                                                                            4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                                                                                                                            SHA512

                                                                                                                                            cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vao5cxwm\vao5cxwm.dll

                                                                                                                                            Filesize

                                                                                                                                            6KB

                                                                                                                                            MD5

                                                                                                                                            5b09dca7c7bc526e972e5a30604bbf24

                                                                                                                                            SHA1

                                                                                                                                            ba1a484e2a4c17943caac5962500b644f1674ac9

                                                                                                                                            SHA256

                                                                                                                                            86a4e8d5856b014fed328016577fb72914f3fb26a569d932dbb8fb3e54311d94

                                                                                                                                            SHA512

                                                                                                                                            54cc6ff6449d4705f87583f8e73fef5df767b0082d49c13d4a6e35bf6b23161df8236ce0430531e74009799d56cd8a3212026eb3fd0afb49b83d0631a0ac8994

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2718508534-2116753757-2794822388-1000\76b53b3ec448f7ccdda2063b15d2bfc3_67d0031d-6e32-4a16-a828-c69a0898a61c

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            84229b95b53613647d0bb62807dacab0

                                                                                                                                            SHA1

                                                                                                                                            e64ddf5d5a55c4e06f2f285a6f7ed5ab88ee82af

                                                                                                                                            SHA256

                                                                                                                                            ca23cc1569e02b3222887bb778bee5c2bc7750ecbf7717170d656f46246de8d2

                                                                                                                                            SHA512

                                                                                                                                            ac7a356a050ff5d3684d05df7e7190c83a94bb9c15d0214c0a97b46bd0e34d081abfd2f52dd400f11cf15b42ec7406c51e20fe5d52e63e2d0c0581950cc23e8a

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\build.exe

                                                                                                                                            Filesize

                                                                                                                                            95KB

                                                                                                                                            MD5

                                                                                                                                            d32bddd3639f42733a78945885002128

                                                                                                                                            SHA1

                                                                                                                                            6dcfc09b8c86e79ac70a63132a5162d3616c6479

                                                                                                                                            SHA256

                                                                                                                                            34dac9b900a3c810e466f9cac9ba5f0a062ff2be7719fc443cb23d0f8ac0390e

                                                                                                                                            SHA512

                                                                                                                                            b28fc39e77245d5a52ae5d25ac363c95db8b20a960caabc7aa4f3339b2a8d27f7f92846e2a4173fd0f776be4034fbfe5e60b375eebb465dbe78017d8479ad511

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                                                            Filesize

                                                                                                                                            109KB

                                                                                                                                            MD5

                                                                                                                                            154c3f1334dd435f562672f2664fea6b

                                                                                                                                            SHA1

                                                                                                                                            51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                                                                                            SHA256

                                                                                                                                            5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                                                                                            SHA512

                                                                                                                                            1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                                                                                            Filesize

                                                                                                                                            1.2MB

                                                                                                                                            MD5

                                                                                                                                            f35b671fda2603ec30ace10946f11a90

                                                                                                                                            SHA1

                                                                                                                                            059ad6b06559d4db581b1879e709f32f80850872

                                                                                                                                            SHA256

                                                                                                                                            83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                                                                                            SHA512

                                                                                                                                            b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                                                                                            Filesize

                                                                                                                                            541KB

                                                                                                                                            MD5

                                                                                                                                            1fc4b9014855e9238a361046cfbf6d66

                                                                                                                                            SHA1

                                                                                                                                            c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                                                                                            SHA256

                                                                                                                                            f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                                                                                            SHA512

                                                                                                                                            2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                            MD5

                                                                                                                                            cc90e3326d7b20a33f8037b9aab238e4

                                                                                                                                            SHA1

                                                                                                                                            236d173a6ac462d85de4e866439634db3b9eeba3

                                                                                                                                            SHA256

                                                                                                                                            bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                                                                                            SHA512

                                                                                                                                            b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\system.exe

                                                                                                                                            Filesize

                                                                                                                                            48KB

                                                                                                                                            MD5

                                                                                                                                            dcf19e9bc0482a5279804f1a5e7dca3f

                                                                                                                                            SHA1

                                                                                                                                            e78c0204c879c3e71246bc36a25c2fc1672ac07f

                                                                                                                                            SHA256

                                                                                                                                            90b02e70c043d8b715ce7a85e4b89ef496c84d51feda749ab28d1388b61f5c60

                                                                                                                                            SHA512

                                                                                                                                            bb89168084ee921737d9507f1f59261b684019fa329f5143a3bfd006dad5665e4983accc1b9faa63a1558c84228375d8f6fe591b6abe26189d297c0d309f226b

                                                                                                                                          • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            9a95b5c0745795d185b253a1a2a0afea

                                                                                                                                            SHA1

                                                                                                                                            1bd051b225789e177123ba39c3c0df77796bc54b

                                                                                                                                            SHA256

                                                                                                                                            6acbf4695ecdfeb85204aa177784fff7d029ccbe189c39d9bd99f33869d224e1

                                                                                                                                            SHA512

                                                                                                                                            bb0675cb78e4820debcba9a6f72f779ddb729b17e795e56a5a590ea45fbc4bd5d954ef8266b1697ec43a6bd72586c4b63d019f92b18724bd7928a8976fecf3cd

                                                                                                                                          • C:\Users\Admin\Pictures\2ZUL7VIoUd073lWSlXv0bC4l.exe

                                                                                                                                            Filesize

                                                                                                                                            7KB

                                                                                                                                            MD5

                                                                                                                                            5b423612b36cde7f2745455c5dd82577

                                                                                                                                            SHA1

                                                                                                                                            0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                            SHA256

                                                                                                                                            e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                            SHA512

                                                                                                                                            c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                                          • C:\Users\Admin\Pictures\JGaPHJhvnOvfhi5qPGjVEvJv.exe

                                                                                                                                            Filesize

                                                                                                                                            462KB

                                                                                                                                            MD5

                                                                                                                                            896e29199a2abfc90efd485ffb165596

                                                                                                                                            SHA1

                                                                                                                                            623ca3501802f9ea696a89856f28098cb0ed2c3b

                                                                                                                                            SHA256

                                                                                                                                            75285c67e3f8f84d0d8d579af2b20d07ef3b71e527add74033f53c0a6132b066

                                                                                                                                            SHA512

                                                                                                                                            9723576ce41453915ec7deb5fee3060041a6c48dc7e25af2a4d72b451658937de5c9f2ebdc5219ade6ff3a4a81e3bded7b1eb41d975de0f79409a4a09f5c64ba

                                                                                                                                          • C:\Users\Admin\Pictures\NzaXIcSfpaWXyiL22VjJhfgg.exe

                                                                                                                                            Filesize

                                                                                                                                            4.2MB

                                                                                                                                            MD5

                                                                                                                                            3953bbad77cdcb9d5af2694eed7e6688

                                                                                                                                            SHA1

                                                                                                                                            f965b69eb36d1fbdfb7dfa8c26ba959f395b3223

                                                                                                                                            SHA256

                                                                                                                                            62206e7cb02b4fe03c535aa4daaecfa46b42dbd28a756471e50784b7622cecaf

                                                                                                                                            SHA512

                                                                                                                                            94a5033ede92683e063829c5a8f2d720c919d1320bf4db18cc9a2e2a69387530b4afacc73cf987695a01c09acba1169eea77a0ff269b41698147cd64e64a7d38

                                                                                                                                          • C:\Users\Admin\Pictures\Wt98sPs2zvn5zgrCI5OdnURt.exe

                                                                                                                                            Filesize

                                                                                                                                            5.1MB

                                                                                                                                            MD5

                                                                                                                                            75b3cdd9b811d481b9b7aca96c9e2e18

                                                                                                                                            SHA1

                                                                                                                                            34da663875e73794fe3f4dc5758c5be9638eccb6

                                                                                                                                            SHA256

                                                                                                                                            ad28b81661049573289f43bace9613127a81afbc9744f11d34752eb895d04c18

                                                                                                                                            SHA512

                                                                                                                                            b45cf6ff5e1b3694e7df3ab677b764bac4a0c0421eeee0585eb793924c9901d42d3903732202c45f00a78788005a3b1b40d423a9a183f3a466795cb561d2cb01

                                                                                                                                          • C:\Users\Admin\Pictures\ajKg7GWbQLc3XCBxjqtPLFvh.exe

                                                                                                                                            Filesize

                                                                                                                                            6.4MB

                                                                                                                                            MD5

                                                                                                                                            aaa56797070369ad346fbd9bb6cc5e8b

                                                                                                                                            SHA1

                                                                                                                                            a1d01943f0a354d3a000628262671254ca6a91b8

                                                                                                                                            SHA256

                                                                                                                                            9d7d08ac35f0113f7c814d257bf88b8222975aaa0a3fdeda88ac7185dbc50905

                                                                                                                                            SHA512

                                                                                                                                            e69d25a158567c6bce6e9450de17d0814b9b9c11f4bb31e5dcc3e8b4378062cc7e31da625f6ba4a2280b393034a6c832a0fc0a1e16364dc7e8c8146de245b5be

                                                                                                                                          • C:\Users\Admin\Pictures\g3yxtASvpHV6LwvywQk0no7G.exe

                                                                                                                                            Filesize

                                                                                                                                            4.2MB

                                                                                                                                            MD5

                                                                                                                                            275c528d464e32e28829e44120e8ef81

                                                                                                                                            SHA1

                                                                                                                                            12415443bd9ff68aff934eaeabec730de19469c8

                                                                                                                                            SHA256

                                                                                                                                            d378a92fae120b725634f69a615c3e706d6c21b107dc4b1bd514a254a1b0d640

                                                                                                                                            SHA512

                                                                                                                                            42ee3b35f07db97496e9cab4398a4b0d9cd7794bdfa069a7fd2814f1cd2173b8c836ea0305b397eae7051ce29320edc49115a7dc4057ef2025f99d7525920f99

                                                                                                                                          • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                            Filesize

                                                                                                                                            2KB

                                                                                                                                            MD5

                                                                                                                                            4ff8ea78c14a4f7fa6e8cf0c139bc55b

                                                                                                                                            SHA1

                                                                                                                                            e3fa852b5c38482a5e6e1c9234a09be6d8790ab9

                                                                                                                                            SHA256

                                                                                                                                            97b89b75fdeeb096dbf36d13b18b959e50a4246691aea349213c22ae7b19cc00

                                                                                                                                            SHA512

                                                                                                                                            13785608d437cb3be729986de88a35df6a7ab1ed35e6fb730448a9462e02caacbad30ad5cf328ddf598e554f758f44425bbf0dc99efd3c056fae5d930569771d

                                                                                                                                          • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                            Filesize

                                                                                                                                            127B

                                                                                                                                            MD5

                                                                                                                                            8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                            SHA1

                                                                                                                                            a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                            SHA256

                                                                                                                                            9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                            SHA512

                                                                                                                                            5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\vao5cxwm\CSC12BFC8ACBEC540F8A3E3E09A3B819E1.TMP

                                                                                                                                            Filesize

                                                                                                                                            652B

                                                                                                                                            MD5

                                                                                                                                            f7aed8b0731a23f20a444b1f6a49dacf

                                                                                                                                            SHA1

                                                                                                                                            9bd293e17f2d7869c8d88ec0cb9a7bd20db149cf

                                                                                                                                            SHA256

                                                                                                                                            c78107b75aadc0587be353db821f64be09937128c05792e5af8698025f89f4be

                                                                                                                                            SHA512

                                                                                                                                            fa512d7b01340a1bbe8e703dbb390daa87b05c8b0395ba2239fa88ea332dea8a3547374ff3fac8de4dd1cbcb1f5dd80c5d8fc7e98b76aae1be4bd32a30d97843

                                                                                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\vao5cxwm\vao5cxwm.0.cs

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                            MD5

                                                                                                                                            d784666bd143ad91647f8e799749e071

                                                                                                                                            SHA1

                                                                                                                                            706389c04825f2e12a24d00f67ea7140cdccf4ef

                                                                                                                                            SHA256

                                                                                                                                            3bd5920de953fb49e0aec7994f20bcd50d304acf5a3f4f3b23d7408a6cb41ac6

                                                                                                                                            SHA512

                                                                                                                                            c5a4c8817e19df8ad88aae8b9caa243235b23c31bf493704cddcb46e88df203b5fc5b03b535b06bade9816782828b7ba8c5fe247384c344677e570a15bcd07ac

                                                                                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\vao5cxwm\vao5cxwm.cmdline

                                                                                                                                            Filesize

                                                                                                                                            366B

                                                                                                                                            MD5

                                                                                                                                            ad6bc9ef55e6408b385859ae8d99c911

                                                                                                                                            SHA1

                                                                                                                                            f8eb57205c2c71a763c6e3fc9974d161b65fe56e

                                                                                                                                            SHA256

                                                                                                                                            5035979f6fa30e3a3926b570a8d23ee996590372f9ff1274f26334487b174c6c

                                                                                                                                            SHA512

                                                                                                                                            8298ffc2358b261bc4150b4c9c0774d65bb7816f4f73e4c8e3ff9cec036f3a373c1517dd8999027ee4e1accf72f48fe6eb818457940e36b835d53acb399a14db

                                                                                                                                          • memory/592-911-0x0000000000400000-0x0000000004043000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            60.3MB

                                                                                                                                          • memory/972-7-0x00000000058B0000-0x00000000058B1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-10-0x0000000005940000-0x0000000005941000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-1-0x00000000770C6000-0x00000000770C8000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/972-5-0x00000000058D0000-0x00000000058D1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-16-0x0000000000F40000-0x00000000013F2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/972-9-0x0000000005910000-0x0000000005911000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-0-0x0000000000F40000-0x00000000013F2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/972-2-0x0000000000F40000-0x00000000013F2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/972-8-0x00000000058C0000-0x00000000058C1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-6-0x0000000005920000-0x0000000005921000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-11-0x0000000005930000-0x0000000005931000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-4-0x00000000058F0000-0x00000000058F1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/972-3-0x00000000058E0000-0x00000000058E1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/1028-859-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/1028-909-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/1196-225-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/1196-226-0x0000000000100000-0x0000000000152000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            328KB

                                                                                                                                          • memory/1196-241-0x0000000004C00000-0x0000000004C10000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1640-861-0x0000000000400000-0x0000000004067000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            60.4MB

                                                                                                                                          • memory/1880-863-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/1880-905-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/2092-390-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/2116-212-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/2116-95-0x0000000005350000-0x0000000005360000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/2116-94-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/2116-87-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.6MB

                                                                                                                                          • memory/3120-558-0x0000000000400000-0x0000000004043000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            60.3MB

                                                                                                                                          • memory/3316-49-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/3316-62-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/3316-56-0x0000000002FA0000-0x0000000004FA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32.0MB

                                                                                                                                          • memory/3316-48-0x0000000000990000-0x00000000009E2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            328KB

                                                                                                                                          • memory/3572-20-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-19-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-23-0x0000000005230000-0x0000000005231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-560-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-901-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-164-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-21-0x0000000005240000-0x0000000005241000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-22-0x0000000005250000-0x0000000005251000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-27-0x00000000052A0000-0x00000000052A1000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-28-0x0000000005290000-0x0000000005291000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-356-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-91-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-25-0x0000000005210000-0x0000000005211000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-26-0x0000000005220000-0x0000000005221000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-1313-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3572-24-0x0000000005270000-0x0000000005271000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/3572-1147-0x0000000000BF0000-0x00000000010A2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.7MB

                                                                                                                                          • memory/3756-227-0x000000001DA70000-0x000000001DB7A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.0MB

                                                                                                                                          • memory/3756-128-0x0000000000740000-0x00000000007CC000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            560KB

                                                                                                                                          • memory/3756-228-0x000000001C3A0000-0x000000001C3B2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            72KB

                                                                                                                                          • memory/3756-138-0x00007FFFA8370000-0x00007FFFA8E32000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/3756-139-0x000000001B4A0000-0x000000001B4B0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/3760-314-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.2MB

                                                                                                                                          • memory/3760-305-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.2MB

                                                                                                                                          • memory/3760-625-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            972KB

                                                                                                                                          • memory/3912-165-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            312KB

                                                                                                                                          • memory/3912-169-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            312KB

                                                                                                                                          • memory/3912-168-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            312KB

                                                                                                                                          • memory/3948-216-0x0000000005DA0000-0x0000000005E0E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            440KB

                                                                                                                                          • memory/3948-213-0x00000000042D0000-0x00000000043D0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1024KB

                                                                                                                                          • memory/3948-513-0x0000000000400000-0x0000000004067000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            60.4MB

                                                                                                                                          • memory/4332-55-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                          • memory/4332-58-0x0000000001580000-0x00000000015C0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/4332-60-0x0000000001580000-0x00000000015C0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/4332-59-0x0000000001580000-0x00000000015C0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/4332-57-0x0000000001580000-0x00000000015C0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/4332-61-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                          • memory/4332-52-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                          • memory/4432-117-0x0000000005290000-0x0000000005836000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            5.6MB

                                                                                                                                          • memory/4432-140-0x0000000006000000-0x000000000601E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            120KB

                                                                                                                                          • memory/4432-147-0x00000000064E0000-0x000000000652C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            304KB

                                                                                                                                          • memory/4432-120-0x0000000004E80000-0x0000000004E8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            40KB

                                                                                                                                          • memory/4432-119-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/4432-146-0x0000000006370000-0x00000000063AC000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            240KB

                                                                                                                                          • memory/4432-145-0x0000000006310000-0x0000000006322000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            72KB

                                                                                                                                          • memory/4432-144-0x00000000063D0000-0x00000000064DA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.0MB

                                                                                                                                          • memory/4432-118-0x0000000004CE0000-0x0000000004D72000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            584KB

                                                                                                                                          • memory/4432-143-0x0000000006880000-0x0000000006E98000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            6.1MB

                                                                                                                                          • memory/4432-137-0x0000000005840000-0x00000000058B6000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            472KB

                                                                                                                                          • memory/4432-115-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/4432-116-0x0000000000300000-0x0000000000352000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            328KB

                                                                                                                                          • memory/4584-82-0x00000000005E0000-0x000000000079C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.7MB

                                                                                                                                          • memory/4584-90-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/4584-84-0x0000000002BB0000-0x0000000002BC0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/4584-83-0x0000000072A80000-0x0000000073231000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.7MB

                                                                                                                                          • memory/4760-933-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/4760-831-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/5000-167-0x0000000000980000-0x00000000009F4000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            464KB

                                                                                                                                          • memory/5312-1222-0x0000000140000000-0x0000000140AA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.6MB

                                                                                                                                          • memory/5312-1229-0x0000000140000000-0x0000000140AA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.6MB

                                                                                                                                          • memory/5312-1223-0x0000000140000000-0x0000000140AA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.6MB

                                                                                                                                          • memory/5312-1227-0x0000000140000000-0x0000000140AA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.6MB

                                                                                                                                          • memory/5500-1148-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/5572-1151-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB

                                                                                                                                          • memory/5608-1160-0x0000000000400000-0x0000000004426000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64.1MB