Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/01/2023, 12:46

230109-pzzzkaeb73 10

31/12/2022, 16:26

221231-txqekahh85 10

31/12/2022, 16:11

221231-tnc3wahh62 10

Analysis

  • max time kernel
    1800s
  • max time network
    1789s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2022, 16:26

General

  • Target

    2f7a15691c51124019ccf5cbde2f399e52164f645b70bf4aaab596391146bb7f.exe

  • Size

    262KB

  • MD5

    a58ba818715cbcd50fff388b246e04d1

  • SHA1

    52ebdb14a8e3d61ffc6b3df3d76c4434733ea7de

  • SHA256

    2f7a15691c51124019ccf5cbde2f399e52164f645b70bf4aaab596391146bb7f

  • SHA512

    d6a98a816a0e5561128d674371f130cf43b68bc4c350866b20d1eac970e4c5aa4db53badec16dc27df3695e97d2bdb6e6fa8ae72981324671c060457c03339ee

  • SSDEEP

    3072:MlLntn1Y9zL3g7foklrmRQXN7SCzyLgCmN6kb5vfOxOvlmqrzn8f227hZY:sneL3qocb7SufCJ4SOYcn8rZY

Malware Config

Extracted

Path

C:\_readme.txt

Family

djvu

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-OKSOfVy04R Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0625SduefzyLgcsh7AtBZ4UXI56nqwQltkzjkfNYsUiDJjQLL
URLs

https://we.tl/t-OKSOfVy04R

Extracted

Family

amadey

Version

3.63

C2

62.204.41.109/Nmkn5d9Dn/index.php

Extracted

Family

djvu

C2

http://ex3mall.com/lancer/get.php

Attributes
  • extension

    .znto

  • offline_id

    bE95c2N1x4fARf4W3qmFCjkKPwfFkQaU9NpNBMt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://ex3mall.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-OKSOfVy04R Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0625Sduef

rsa_pubkey.plain

Extracted

Family

vidar

Version

1.7

Botnet

19

C2

https://t.me/robloxblackl

https://steamcommunity.com/profiles/76561199458928097

Attributes
  • profile_id

    19

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Amadey credential stealer module 2 IoCs
  • Detected Djvu ransomware 10 IoCs
  • Detects LgoogLoader payload 2 IoCs
  • Detects Smokeloader packer 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Blocklisted process makes network request 55 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 64 IoCs
  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 11 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 13 IoCs
  • Drops file in Program Files directory 63 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 16 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f7a15691c51124019ccf5cbde2f399e52164f645b70bf4aaab596391146bb7f.exe
    "C:\Users\Admin\AppData\Local\Temp\2f7a15691c51124019ccf5cbde2f399e52164f645b70bf4aaab596391146bb7f.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2104
  • C:\Users\Admin\AppData\Local\Temp\D1FB.exe
    C:\Users\Admin\AppData\Local\Temp\D1FB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Users\Admin\AppData\Local\Temp\D1FB.exe
      C:\Users\Admin\AppData\Local\Temp\D1FB.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1916
      • C:\Users\Admin\AppData\Local\Temp\D1FB.exe
        "C:\Users\Admin\AppData\Local\Temp\D1FB.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:4008
        • C:\Users\Admin\AppData\Local\Temp\D1FB.exe
          "C:\Users\Admin\AppData\Local\Temp\D1FB.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Modifies extensions of user files
          • Checks computer location settings
          PID:4968
          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe
            "C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:3060
            • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe
              "C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              PID:4736
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe" & exit
                7⤵
                  PID:2840
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:3464
            • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build3.exe
              "C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build3.exe"
              5⤵
              • Executes dropped EXE
              PID:4228
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • Creates scheduled task(s)
                PID:2988
    • C:\Users\Admin\AppData\Local\Temp\D576.exe
      C:\Users\Admin\AppData\Local\Temp\D576.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
        "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3192
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:4196
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb465ca805" /P "Admin:N"&&CACLS "..\cb465ca805" /P "Admin:R" /E&&Exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            4⤵
              PID:3004
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "nbveek.exe" /P "Admin:N"
              4⤵
                PID:3132
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "nbveek.exe" /P "Admin:R" /E
                4⤵
                  PID:5096
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  4⤵
                    PID:736
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\cb465ca805" /P "Admin:N"
                    4⤵
                      PID:1496
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\cb465ca805" /P "Admin:R" /E
                      4⤵
                        PID:1332
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      PID:704
                • C:\Users\Admin\AppData\Local\Temp\D690.exe
                  C:\Users\Admin\AppData\Local\Temp\D690.exe
                  1⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:4644
                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                    "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:3640
                • C:\Users\Admin\AppData\Local\Temp\D941.exe
                  C:\Users\Admin\AppData\Local\Temp\D941.exe
                  1⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:2272
                • C:\Users\Admin\AppData\Local\Temp\DA9A.exe
                  C:\Users\Admin\AppData\Local\Temp\DA9A.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4912
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 340
                    2⤵
                    • Program crash
                    PID:3816
                • C:\Users\Admin\AppData\Local\Temp\E365.exe
                  C:\Users\Admin\AppData\Local\Temp\E365.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4836
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                    2⤵
                      PID:2196
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1276
                      2⤵
                      • Program crash
                      PID:3196
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1284
                      2⤵
                      • Program crash
                      PID:1964
                  • C:\Users\Admin\AppData\Local\Temp\E73E.exe
                    C:\Users\Admin\AppData\Local\Temp\E73E.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:2140
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                      2⤵
                        PID:3600
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                        2⤵
                          PID:456
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                          2⤵
                            PID:3640
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1296
                            2⤵
                            • Program crash
                            PID:8
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1316
                            2⤵
                            • Program crash
                            PID:5044
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4912 -ip 4912
                          1⤵
                            PID:5072
                          • C:\Users\Admin\AppData\Local\Temp\ECEC.exe
                            C:\Users\Admin\AppData\Local\Temp\ECEC.exe
                            1⤵
                            • Executes dropped EXE
                            PID:4236
                          • C:\Users\Admin\AppData\Local\Temp\F152.exe
                            C:\Users\Admin\AppData\Local\Temp\F152.exe
                            1⤵
                            • Executes dropped EXE
                            PID:1848
                          • C:\Windows\system32\taskmgr.exe
                            "C:\Windows\system32\taskmgr.exe" /4
                            1⤵
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Modifies Internet Explorer settings
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:3956
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4836 -ip 4836
                            1⤵
                              PID:4240
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4836 -ip 4836
                              1⤵
                                PID:1700
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2140 -ip 2140
                                1⤵
                                  PID:3916
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2140 -ip 2140
                                  1⤵
                                    PID:3128
                                  • C:\Users\Admin\AppData\Local\Temp\69DF.exe
                                    C:\Users\Admin\AppData\Local\Temp\69DF.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    • Suspicious use of SetThreadContext
                                    • Checks processor information in registry
                                    PID:4748
                                    • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3208
                                      • C:\Windows\system32\notepad.exe
                                        "C:\Windows\system32\notepad.exe"
                                        3⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4844
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"
                                          4⤵
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Enumerates system info in registry
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1812
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa137f4f50,0x7ffa137f4f60,0x7ffa137f4f70
                                            5⤵
                                              PID:3252
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,12093081480585971061,2894952810602035438,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1932 /prefetch:8
                                              5⤵
                                                PID:2316
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,12093081480585971061,2894952810602035438,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:2
                                                5⤵
                                                  PID:4808
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,12093081480585971061,2894952810602035438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 /prefetch:8
                                                  5⤵
                                                    PID:3240
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,12093081480585971061,2894952810602035438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3576 /prefetch:8
                                                    5⤵
                                                      PID:836
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 1812 -s 3656
                                                      5⤵
                                                      • Program crash
                                                      PID:4196
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 492
                                                  3⤵
                                                  • Program crash
                                                  PID:4348
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
                                                2⤵
                                                • Blocklisted process makes network request
                                                • Sets service image path in registry
                                                • Accesses Microsoft Outlook accounts
                                                • Accesses Microsoft Outlook profiles
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Program Files directory
                                                • Checks processor information in registry
                                                • Modifies system certificate store
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • outlook_office_path
                                                • outlook_win_path
                                                PID:2224
                                                • C:\Windows\system32\rundll32.exe
                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 30799
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:1208
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                                  3⤵
                                                    PID:3584
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                                    3⤵
                                                      PID:1204
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                                      3⤵
                                                        PID:3184
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                                        3⤵
                                                          PID:2548
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                                          3⤵
                                                            PID:2284
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                                            3⤵
                                                              PID:2068
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3208 -ip 3208
                                                          1⤵
                                                            PID:3856
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:2408
                                                            • C:\Windows\system32\WerFault.exe
                                                              C:\Windows\system32\WerFault.exe -pss -s 580 -p 1812 -ip 1812
                                                              1⤵
                                                                PID:3492
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:636
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                  2⤵
                                                                  • Creates scheduled task(s)
                                                                  PID:4672
                                                              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:1268
                                                              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:3932
                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ResizeNew.txt
                                                                1⤵
                                                                • Opens file in notepad (likely ransom note)
                                                                PID:616
                                                              • C:\Windows\system32\werfault.exe
                                                                werfault.exe /h /shared Global\cf8389436b474985924228e230334c86 /t 2500 /p 616
                                                                1⤵
                                                                  PID:2280
                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ResizeNew.txt
                                                                  1⤵
                                                                  • Opens file in notepad (likely ransom note)
                                                                  PID:1536
                                                                • C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe
                                                                  "C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • Checks processor information in registry
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:2032
                                                                  • C:\Windows\TEMP\Iqpoqhfidqa.exe
                                                                    "C:\Windows\TEMP\Iqpoqhfidqa.exe"
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    PID:3768
                                                                    • C:\Windows\system32\notepad.exe
                                                                      "C:\Windows\system32\notepad.exe"
                                                                      3⤵
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2220
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"
                                                                        4⤵
                                                                        • Drops file in System32 directory
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:3540
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Windows\system32\config\systemprofile\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa137f4f50,0x7ffa137f4f60,0x7ffa137f4f70
                                                                          5⤵
                                                                          • Drops file in System32 directory
                                                                          PID:2708
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:1
                                                                          5⤵
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:4308
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:1
                                                                          5⤵
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:740
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1948 /prefetch:8
                                                                          5⤵
                                                                            PID:5072
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1980 /prefetch:8
                                                                            5⤵
                                                                            • Drops file in System32 directory
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:4188
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:2
                                                                            5⤵
                                                                              PID:2176
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:1
                                                                              5⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:4884
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2848 /prefetch:1
                                                                              5⤵
                                                                                PID:5084
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1912,13469269635633123266,9028454598703811791,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:1
                                                                                5⤵
                                                                                • Modifies data under HKEY_USERS
                                                                                PID:4640
                                                                              • C:\Windows\system32\WerFault.exe
                                                                                C:\Windows\system32\WerFault.exe -u -p 3540 -s 3948
                                                                                5⤵
                                                                                • Program crash
                                                                                PID:3144
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 344
                                                                            3⤵
                                                                            • Program crash
                                                                            PID:2252
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
                                                                          2⤵
                                                                          • Blocklisted process makes network request
                                                                          • Checks processor information in registry
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:3240
                                                                          • C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe
                                                                            "C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe"
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • Checks processor information in registry
                                                                            PID:3692
                                                                            • C:\Windows\TEMP\Iqpoqhfidqa.exe
                                                                              "C:\Windows\TEMP\Iqpoqhfidqa.exe"
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              PID:860
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 428
                                                                                5⤵
                                                                                • Program crash
                                                                                PID:1560
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 424
                                                                                5⤵
                                                                                • Program crash
                                                                                PID:3968
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
                                                                              4⤵
                                                                              • Checks processor information in registry
                                                                              PID:1840
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1128
                                                                          2⤵
                                                                          • Program crash
                                                                          PID:3412
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3768 -ip 3768
                                                                        1⤵
                                                                          PID:3564
                                                                        • C:\Windows\system32\WerFault.exe
                                                                          C:\Windows\system32\WerFault.exe -pss -s 560 -p 3540 -ip 3540
                                                                          1⤵
                                                                            PID:2988
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:1876
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 860 -ip 860
                                                                              1⤵
                                                                                PID:1408
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 860 -ip 860
                                                                                1⤵
                                                                                  PID:364
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2032 -ip 2032
                                                                                  1⤵
                                                                                    PID:1996
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"
                                                                                    1⤵
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • Enumerates system info in registry
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:1272
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa137f4f50,0x7ffa137f4f60,0x7ffa137f4f70
                                                                                      2⤵
                                                                                        PID:2120
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,1671148172221766562,14024768565349580517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2032 /prefetch:8
                                                                                        2⤵
                                                                                          PID:1196
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,1671148172221766562,14024768565349580517,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2000 /prefetch:8
                                                                                          2⤵
                                                                                            PID:2196
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1932,1671148172221766562,14024768565349580517,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:2
                                                                                            2⤵
                                                                                              PID:2212
                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                              C:\Windows\system32\WerFault.exe -u -p 1272 -s 3172
                                                                                              2⤵
                                                                                              • Program crash
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:5084
                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4652
                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                              C:\Windows\system32\WerFault.exe -pss -s 600 -p 1272 -ip 1272
                                                                                              1⤵
                                                                                                PID:4020
                                                                                              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1760
                                                                                              • C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks SCSI registry key(s)
                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                PID:1076
                                                                                              • C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2692
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 340
                                                                                                  2⤵
                                                                                                  • Program crash
                                                                                                  PID:4584
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2692 -ip 2692
                                                                                                1⤵
                                                                                                  PID:4284
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3096
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4276
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1316
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4884
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2196
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1604
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4724
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4584
                                                                                                • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                  C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  PID:756
                                                                                                  • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                    C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:3028
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1140
                                                                                                • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4276
                                                                                                • C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                  C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Checks SCSI registry key(s)
                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                  PID:1560
                                                                                                • C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                  C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1336
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 304
                                                                                                    2⤵
                                                                                                    • Program crash
                                                                                                    PID:984
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1336 -ip 1336
                                                                                                  1⤵
                                                                                                    PID:2468
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4576
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2136
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4996
                                                                                                  • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                    C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    PID:4512
                                                                                                    • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                      C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4648
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1492
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2296
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:3432
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:3056
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:5072
                                                                                                  • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                    C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    PID:4176
                                                                                                    • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                      C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4244
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4724
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2184
                                                                                                  • C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                    C:\Users\Admin\AppData\Roaming\fsgvusd
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Checks SCSI registry key(s)
                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                    PID:2308
                                                                                                  • C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                    C:\Users\Admin\AppData\Roaming\icgvusd
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:984
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 304
                                                                                                      2⤵
                                                                                                      • Program crash
                                                                                                      PID:5036
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 984 -ip 984
                                                                                                    1⤵
                                                                                                      PID:4476
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4756
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1008
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4564
                                                                                                    • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                      C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      PID:1816
                                                                                                      • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe
                                                                                                        C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe --Task
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2840
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                      1⤵
                                                                                                        PID:4268
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                        1⤵
                                                                                                          PID:388
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                                                                                                          1⤵
                                                                                                            PID:3128

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe

                                                                                                            Filesize

                                                                                                            6.6MB

                                                                                                            MD5

                                                                                                            04bef5271106e6c80fe3816f5fe1b2eb

                                                                                                            SHA1

                                                                                                            b83db159a59f6cde99a912b8cc408c30005e5cac

                                                                                                            SHA256

                                                                                                            c9bdbf5ccd38b910f1ad455271c7fd9639cfa5abe74f87d78885d4262154567a

                                                                                                            SHA512

                                                                                                            8ef7b89e4cb777f2fdcf439b1d34d1347f16f19bbb540640c2e7925b771b19f134539a19967bd98dcbc1a941424c938708271982e1fdedadfc5735698b46fd00

                                                                                                          • C:\Program Files (x86)\Windows Multimedia Platform\EPDF_Full..exe

                                                                                                            Filesize

                                                                                                            6.6MB

                                                                                                            MD5

                                                                                                            04bef5271106e6c80fe3816f5fe1b2eb

                                                                                                            SHA1

                                                                                                            b83db159a59f6cde99a912b8cc408c30005e5cac

                                                                                                            SHA256

                                                                                                            c9bdbf5ccd38b910f1ad455271c7fd9639cfa5abe74f87d78885d4262154567a

                                                                                                            SHA512

                                                                                                            8ef7b89e4cb777f2fdcf439b1d34d1347f16f19bbb540640c2e7925b771b19f134539a19967bd98dcbc1a941424c938708271982e1fdedadfc5735698b46fd00

                                                                                                          • C:\ProgramData\mozglue.dll

                                                                                                            Filesize

                                                                                                            133KB

                                                                                                            MD5

                                                                                                            8f73c08a9660691143661bf7332c3c27

                                                                                                            SHA1

                                                                                                            37fa65dd737c50fda710fdbde89e51374d0c204a

                                                                                                            SHA256

                                                                                                            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                                                                                            SHA512

                                                                                                            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                                                                                          • C:\ProgramData\nss3.dll

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                            MD5

                                                                                                            bfac4e3c5908856ba17d41edcd455a51

                                                                                                            SHA1

                                                                                                            8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                                                                                            SHA256

                                                                                                            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                                                                                            SHA512

                                                                                                            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            9d77c9193735a61912ff3bccb47168a7

                                                                                                            SHA1

                                                                                                            aee81c528117867ca69f22f93aa2ca710f908b6e

                                                                                                            SHA256

                                                                                                            79b78c9e1d9c4fb6c08413757fee9d3d2fdb15415f6b8b9cd9c3bd67a235ba95

                                                                                                            SHA512

                                                                                                            c70ae8ed0d68f38b217f4b6ac809050f27f71e6de140712c56ecf7c55896ae518993c55193bc282097580a3f7c869424789aa3c3cc8ecc81c394f8e15c1f77bb

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            a2b3de2676790ac64a1bc51ba3e667d1

                                                                                                            SHA1

                                                                                                            2a7f7090fed2ddd299339197428a9fafc3fd349b

                                                                                                            SHA256

                                                                                                            aa8cdcc9c8c19d24037aa62dfb529b22d25a7eb3927d35f59572c153c81c5a4a

                                                                                                            SHA512

                                                                                                            ab9e80a077a2fe486630e4d7fb159994224fce41c6fbc6197cc600e4fac86d504e8b3d1670ca628fb45792498be42a80e1c6b0af4b3e7451bc039222ea123ef5

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                            Filesize

                                                                                                            488B

                                                                                                            MD5

                                                                                                            e98b2e2ebd4bc3445847bd0861c7447a

                                                                                                            SHA1

                                                                                                            63fe67771191859ac8f2776067c431406aaf5f61

                                                                                                            SHA256

                                                                                                            8b9f6d90cf16817e0ada12e4d7af7e9230d0872ed394cf1691d255d8a80086ce

                                                                                                            SHA512

                                                                                                            7304241f2d19e687441460ef00587fa3b893be33461853af812abbc5ea65f281e759ef2e54f742823d652c6721a7dc1900f6088f096879f80b5eea83440340d5

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                            Filesize

                                                                                                            482B

                                                                                                            MD5

                                                                                                            4eb12f9d76adecdcb6334ded93580ddc

                                                                                                            SHA1

                                                                                                            0d95341ecfed8300683fca59513a7c675cc6fba6

                                                                                                            SHA256

                                                                                                            a417d001d0c5f42af52cf368498aab1ab0ff22b6edc3c987b2a85a5e12717e1d

                                                                                                            SHA512

                                                                                                            ff4d8c42c4425fbccd8051b5f635b49e1d0354b0af3c455b3bfd13694f632f8d84e6f3a055fc2fed7f2a6f820743f04a1a5cd9565151b0281bcf9c8cd16964fe

                                                                                                          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe

                                                                                                            Filesize

                                                                                                            407KB

                                                                                                            MD5

                                                                                                            3b6782cde711c6e73e09611c5041060e

                                                                                                            SHA1

                                                                                                            412d9f6e64ebee4287eccff782f04943e5381d4f

                                                                                                            SHA256

                                                                                                            740912c948f5c370a23fa34da6fca7ffa1abc420edefcbe3c7a74170c9f47e8c

                                                                                                            SHA512

                                                                                                            d7883a046d9b153094f9f3e5970b78a9084de8472d219a325006a7652cdf5427641a0c10beef4aceaa4ad9d92ea1a2ccf8104588e51760200e7e85be37524c4e

                                                                                                          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe

                                                                                                            Filesize

                                                                                                            407KB

                                                                                                            MD5

                                                                                                            3b6782cde711c6e73e09611c5041060e

                                                                                                            SHA1

                                                                                                            412d9f6e64ebee4287eccff782f04943e5381d4f

                                                                                                            SHA256

                                                                                                            740912c948f5c370a23fa34da6fca7ffa1abc420edefcbe3c7a74170c9f47e8c

                                                                                                            SHA512

                                                                                                            d7883a046d9b153094f9f3e5970b78a9084de8472d219a325006a7652cdf5427641a0c10beef4aceaa4ad9d92ea1a2ccf8104588e51760200e7e85be37524c4e

                                                                                                          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build2.exe

                                                                                                            Filesize

                                                                                                            407KB

                                                                                                            MD5

                                                                                                            3b6782cde711c6e73e09611c5041060e

                                                                                                            SHA1

                                                                                                            412d9f6e64ebee4287eccff782f04943e5381d4f

                                                                                                            SHA256

                                                                                                            740912c948f5c370a23fa34da6fca7ffa1abc420edefcbe3c7a74170c9f47e8c

                                                                                                            SHA512

                                                                                                            d7883a046d9b153094f9f3e5970b78a9084de8472d219a325006a7652cdf5427641a0c10beef4aceaa4ad9d92ea1a2ccf8104588e51760200e7e85be37524c4e

                                                                                                          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build3.exe

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            9ead10c08e72ae41921191f8db39bc16

                                                                                                            SHA1

                                                                                                            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                                                                            SHA256

                                                                                                            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                                                                            SHA512

                                                                                                            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                                                                          • C:\Users\Admin\AppData\Local\5a247b68-6769-4897-b9dc-edf89d72105c\build3.exe

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            9ead10c08e72ae41921191f8db39bc16

                                                                                                            SHA1

                                                                                                            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                                                                            SHA256

                                                                                                            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                                                                            SHA512

                                                                                                            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                            MD5

                                                                                                            44d593ce7026eeaf6394a3bea547d8af

                                                                                                            SHA1

                                                                                                            2639f67e7e8614774364e3cdca4e7116a23ac32a

                                                                                                            SHA256

                                                                                                            9d696f25e2ecb50a7cf5e29204011abedfc7905527b893a3784235059f6caf4d

                                                                                                            SHA512

                                                                                                            53dab29c27d7e603f2c226471b3b21a9a5040e0792ee14b81ba0ec6bf6223b514d285c7aa247b6e6a047fe3f8c59f4b8963d02b63c093ac1342df04c90f0cc54

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                            MD5

                                                                                                            ce2ed081473bf8e5ec6236ec55cec6da

                                                                                                            SHA1

                                                                                                            4a7d8d89b9ce73af70ff62c3a42429c63cd55b75

                                                                                                            SHA256

                                                                                                            4914db4cb9ed27361b394bae992658996b40094de22e99ad5806f6a375ed63dc

                                                                                                            SHA512

                                                                                                            40896f0ff3c7dd2b90b0a53d43e7d069d437a64eaa3d321ca041d9b18a2756a3b2a08842c4b854863ea956dc27b9f70793f278c2d56c6d1df7132916539e4d36

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\69DF.exe

                                                                                                            Filesize

                                                                                                            6.6MB

                                                                                                            MD5

                                                                                                            d34a95bc4a5f4df11581e03d96a7f8bf

                                                                                                            SHA1

                                                                                                            40a3e96a09f772d462df0885fec6fbfc28ab1361

                                                                                                            SHA256

                                                                                                            10a8e16d01a0f3c9bea04f78f55651637252dcf82f5f3b8bd4325d04da774919

                                                                                                            SHA512

                                                                                                            e27082cc4988a6649d7bd10baef55250e910a07fae66b1dd5ce4deac0046082a6d2e4abacbb1f3bf32568853c6ef51066b3884fb5c347ee69265fb270ab0d025

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\69DF.exe

                                                                                                            Filesize

                                                                                                            6.6MB

                                                                                                            MD5

                                                                                                            d34a95bc4a5f4df11581e03d96a7f8bf

                                                                                                            SHA1

                                                                                                            40a3e96a09f772d462df0885fec6fbfc28ab1361

                                                                                                            SHA256

                                                                                                            10a8e16d01a0f3c9bea04f78f55651637252dcf82f5f3b8bd4325d04da774919

                                                                                                            SHA512

                                                                                                            e27082cc4988a6649d7bd10baef55250e910a07fae66b1dd5ce4deac0046082a6d2e4abacbb1f3bf32568853c6ef51066b3884fb5c347ee69265fb270ab0d025

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D576.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D576.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D576.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D690.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D690.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D941.exe

                                                                                                            Filesize

                                                                                                            263KB

                                                                                                            MD5

                                                                                                            5152660144fec1392a6c828ddacb148b

                                                                                                            SHA1

                                                                                                            b36c25925f15bf9928f3049ea7bcd77703b1d2dc

                                                                                                            SHA256

                                                                                                            3f5c1c606609cbffa1c7c1a006af62f9937c97bf5151d713cd607b6d970569dd

                                                                                                            SHA512

                                                                                                            f7f57247e2f24d8bd18870d834691d6731f649cd565e9d3d76897432d399d0d98052dc983ebea0ff7ecb7c4ac5862c7f3b4da94d9796a768e4b33061c5e020b5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\D941.exe

                                                                                                            Filesize

                                                                                                            263KB

                                                                                                            MD5

                                                                                                            5152660144fec1392a6c828ddacb148b

                                                                                                            SHA1

                                                                                                            b36c25925f15bf9928f3049ea7bcd77703b1d2dc

                                                                                                            SHA256

                                                                                                            3f5c1c606609cbffa1c7c1a006af62f9937c97bf5151d713cd607b6d970569dd

                                                                                                            SHA512

                                                                                                            f7f57247e2f24d8bd18870d834691d6731f649cd565e9d3d76897432d399d0d98052dc983ebea0ff7ecb7c4ac5862c7f3b4da94d9796a768e4b33061c5e020b5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\DA9A.exe

                                                                                                            Filesize

                                                                                                            288KB

                                                                                                            MD5

                                                                                                            00691958a7163e957faff165dff1cabc

                                                                                                            SHA1

                                                                                                            9499e03ff36b01afa4f997a0b9d800b4432d3c33

                                                                                                            SHA256

                                                                                                            a06c4d1ee65e4a6ec3948c0c75de1938b743bad88908ab2bc598b94a5ba0fdd9

                                                                                                            SHA512

                                                                                                            5509b52c5b4a09502b46514afe780126d93ae32a0043910e14719650326881df25f55d55d14cb6a488ffa3a193e12c53ac8bef872967a300d1e8172af98e73c7

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\DA9A.exe

                                                                                                            Filesize

                                                                                                            288KB

                                                                                                            MD5

                                                                                                            00691958a7163e957faff165dff1cabc

                                                                                                            SHA1

                                                                                                            9499e03ff36b01afa4f997a0b9d800b4432d3c33

                                                                                                            SHA256

                                                                                                            a06c4d1ee65e4a6ec3948c0c75de1938b743bad88908ab2bc598b94a5ba0fdd9

                                                                                                            SHA512

                                                                                                            5509b52c5b4a09502b46514afe780126d93ae32a0043910e14719650326881df25f55d55d14cb6a488ffa3a193e12c53ac8bef872967a300d1e8172af98e73c7

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\E365.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            3bf7bbc0f949e65080db6e99d3767e13

                                                                                                            SHA1

                                                                                                            2b3c06b550d5a2171e40a7edc390c88aa258c422

                                                                                                            SHA256

                                                                                                            d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

                                                                                                            SHA512

                                                                                                            d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\E365.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            3bf7bbc0f949e65080db6e99d3767e13

                                                                                                            SHA1

                                                                                                            2b3c06b550d5a2171e40a7edc390c88aa258c422

                                                                                                            SHA256

                                                                                                            d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

                                                                                                            SHA512

                                                                                                            d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\E73E.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            3bf7bbc0f949e65080db6e99d3767e13

                                                                                                            SHA1

                                                                                                            2b3c06b550d5a2171e40a7edc390c88aa258c422

                                                                                                            SHA256

                                                                                                            d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

                                                                                                            SHA512

                                                                                                            d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\E73E.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            3bf7bbc0f949e65080db6e99d3767e13

                                                                                                            SHA1

                                                                                                            2b3c06b550d5a2171e40a7edc390c88aa258c422

                                                                                                            SHA256

                                                                                                            d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

                                                                                                            SHA512

                                                                                                            d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ECEC.exe

                                                                                                            Filesize

                                                                                                            3.5MB

                                                                                                            MD5

                                                                                                            ba2d41ce64789f113baa25ad6014d9ef

                                                                                                            SHA1

                                                                                                            2a613d52de7beddced943814a65f66d8e465fc58

                                                                                                            SHA256

                                                                                                            fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646

                                                                                                            SHA512

                                                                                                            1029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ECEC.exe

                                                                                                            Filesize

                                                                                                            3.5MB

                                                                                                            MD5

                                                                                                            ba2d41ce64789f113baa25ad6014d9ef

                                                                                                            SHA1

                                                                                                            2a613d52de7beddced943814a65f66d8e465fc58

                                                                                                            SHA256

                                                                                                            fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646

                                                                                                            SHA512

                                                                                                            1029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\F152.exe

                                                                                                            Filesize

                                                                                                            3.5MB

                                                                                                            MD5

                                                                                                            ba2d41ce64789f113baa25ad6014d9ef

                                                                                                            SHA1

                                                                                                            2a613d52de7beddced943814a65f66d8e465fc58

                                                                                                            SHA256

                                                                                                            fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646

                                                                                                            SHA512

                                                                                                            1029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\F152.exe

                                                                                                            Filesize

                                                                                                            3.5MB

                                                                                                            MD5

                                                                                                            ba2d41ce64789f113baa25ad6014d9ef

                                                                                                            SHA1

                                                                                                            2a613d52de7beddced943814a65f66d8e465fc58

                                                                                                            SHA256

                                                                                                            fc78c2fc16065bc118f812c5b9df3fa2d2194fee2e684393d151270c7a89c646

                                                                                                            SHA512

                                                                                                            1029c6936334ba5905dbe6cbd190e8c6f200a20545e6ad65ac35ccd7e10aed217648e74c103acfcf5136d239ec7b241ab379e52c9f7502fd5d9da793c4f78301

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe

                                                                                                            Filesize

                                                                                                            1.4MB

                                                                                                            MD5

                                                                                                            526b7ca434081a2cde3a52401145e6d1

                                                                                                            SHA1

                                                                                                            4a56c2f0a375fd61e8c735b8e01b82c5d937f23d

                                                                                                            SHA256

                                                                                                            57c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67

                                                                                                            SHA512

                                                                                                            57b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe

                                                                                                            Filesize

                                                                                                            1.4MB

                                                                                                            MD5

                                                                                                            526b7ca434081a2cde3a52401145e6d1

                                                                                                            SHA1

                                                                                                            4a56c2f0a375fd61e8c735b8e01b82c5d937f23d

                                                                                                            SHA256

                                                                                                            57c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67

                                                                                                            SHA512

                                                                                                            57b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.tmp

                                                                                                            Filesize

                                                                                                            3.5MB

                                                                                                            MD5

                                                                                                            e46489e6f67972c624a8ef215d26db53

                                                                                                            SHA1

                                                                                                            304fdfc6918d97480f65c80891baeb63e55ee3e0

                                                                                                            SHA256

                                                                                                            c34565954052e885c9978fc2b50cf32cc98a67ba9851689101ed5bfffa9bdce4

                                                                                                            SHA512

                                                                                                            6c65ad50bde38b2d6b5880f998e67ac431daa783be6baf925a84f1bb439b04806d1a612f4537363940325bb2aa6d1e692379215a63d1e80ac997fc1a9eb47ac1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\b979706f-a9ef-4d07-92e8-ce62caf05b64.tmp

                                                                                                            Filesize

                                                                                                            23KB

                                                                                                            MD5

                                                                                                            7cd73270bd735f9fe77bc9278f9f2b8b

                                                                                                            SHA1

                                                                                                            b27a898970297c750fb7e4d70ad8f87c1e6c1739

                                                                                                            SHA256

                                                                                                            ee80340a02c0f96a3f9d01e635857d38d7b92444d6102ee29804f559f2eaa7f4

                                                                                                            SHA512

                                                                                                            1fe70455d4d8c0fbab9ef20cf85d0de55fea9f18499c653af5d234462aa5c45eaacceadab39e9be62dc548af4f710362dd34970e1d8a666bf09fe4101bf32077

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                                                                                                            Filesize

                                                                                                            235KB

                                                                                                            MD5

                                                                                                            868acb586930934b250c949e4c3e180e

                                                                                                            SHA1

                                                                                                            d5c992c5f3c5f14205d5e6548979190dd039460a

                                                                                                            SHA256

                                                                                                            4dd88158eabf16c0f154abcb4513042d1aeb4714ece7a3260f089de288b21cd5

                                                                                                            SHA512

                                                                                                            285570bd404ef80b442cf397cb64e896394b2dc125eb3c4517e21224d63f2cb10df6748881a91c6ebb2027db082697ea7230502ce8df103e76d8256f70bbfcf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            fa4b52a52c0158ea53754b0ec1061455

                                                                                                            SHA1

                                                                                                            f9c1ea9a96b50883cc211f678c0980a83b46a21e

                                                                                                            SHA256

                                                                                                            e2eb3d980177fc77f5feb7dac10becffc32e0e492d8403781d4ffbecd11ea764

                                                                                                            SHA512

                                                                                                            226c895c1613a7b39550750b87d62590a126812f0a20d08692f690f618fbf1c1a5cf666f174e06dfd87bcab96300d80cf6925fbd8b242b3cefc481ddbbfcf346

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI16EC.txt

                                                                                                            Filesize

                                                                                                            426KB

                                                                                                            MD5

                                                                                                            8df35a67a3fe81e2c83f723095d5cc69

                                                                                                            SHA1

                                                                                                            f3b903c20d84704bde055d92afec0b4f9400bdf9

                                                                                                            SHA256

                                                                                                            8c678ff5d4a43cbb813b3074659ef6bccb0bb34f53e67c0eb0382b3f08569200

                                                                                                            SHA512

                                                                                                            49494d66ee21de2a1e5714fb58d21dc705b03fa2711032c04741a2571dbc8987726d9a7080170bbb722edc76892d26f8fc9eb208b2631713898a20b6ddc12899

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI1716.txt

                                                                                                            Filesize

                                                                                                            414KB

                                                                                                            MD5

                                                                                                            1a262601a6c8521b5caf3fb1972afd3c

                                                                                                            SHA1

                                                                                                            862011abea027c731d7976c6a716972109fbe90f

                                                                                                            SHA256

                                                                                                            fb1be2909bf17fa3e6322235ea0763ca3a1d38db69e773e2b410a64ee22c1b14

                                                                                                            SHA512

                                                                                                            9e11b376ceac6537a6d9b0c39086324c27cee1a9760394c860e878c1331b5cbb7f42b003140a66e27b1492b75bae4ba86a480a4120f24e0a67c8fbe27f380c11

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI16EC.txt

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            772ea5e059fc4fc157ec59a2e08b98b1

                                                                                                            SHA1

                                                                                                            56705940037616e4554f9129a7778810d34e3ad7

                                                                                                            SHA256

                                                                                                            4f96f39bb83c2bafe6aeb1e1777657bf47ba6702dccec33c2be95e0b3e1d1d3c

                                                                                                            SHA512

                                                                                                            cbdb14e8801918e346b05989dd5a6db33a999b81035c06437c11cd163926450f5d749a1c8959092209aab8a9bfea1b9649b313038a566ebb56850bf3ee3e3791

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1716.txt

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            be757693a3388bdf625f060703106c7b

                                                                                                            SHA1

                                                                                                            cb72c1f46a25a2e14d946ff4336dfef080accb2f

                                                                                                            SHA256

                                                                                                            3fab394e66795a90a4f6f2c9ad8d1af9fa3cc6538c6eba4b7a138440a86c0210

                                                                                                            SHA512

                                                                                                            43cc3d53249a0d553cfb64d10aaca44b0146d960fb2fea2a84cd3cea313a618684edfefa707a22509289d05e04949f6c7715361874848eaf659e664ee359f688

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jawshtml.html

                                                                                                            Filesize

                                                                                                            13B

                                                                                                            MD5

                                                                                                            b2a4bc176e9f29b0c439ef9a53a62a1a

                                                                                                            SHA1

                                                                                                            1ae520cbbf7e14af867232784194366b3d1c3f34

                                                                                                            SHA256

                                                                                                            7b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73

                                                                                                            SHA512

                                                                                                            e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f

                                                                                                          • C:\Users\Admin\AppData\Local\b97dfd98-fca2-422c-a5ce-6779d5891a3f\D1FB.exe

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                            MD5

                                                                                                            e6133ea9349d980fe1bc6775ba9a4851

                                                                                                            SHA1

                                                                                                            5d86f79b568274a26a3956cf27f1e0ca2c2f8000

                                                                                                            SHA256

                                                                                                            b0129df41ef3e0ee1ba9adf39d14b0b3c6d94c2f1cc161f37066a652de902cb4

                                                                                                            SHA512

                                                                                                            111856c90096f685812cd4495d4ad7bda6a262b836b8ae6836fefbc5115d1877a3d6d7208e296521dac427cf0a10a5bd9b7b3f80cce24a9fdfa22569392dd2c5

                                                                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                                            Filesize

                                                                                                            126KB

                                                                                                            MD5

                                                                                                            a98318b262aee202df529fd4dfe4c4ba

                                                                                                            SHA1

                                                                                                            536831b3a0f902ba4d003871c47a967777de0959

                                                                                                            SHA256

                                                                                                            12fb1c2a561508d6cb02b9213de78383d15d5a85fcd70fe5455c988de4db0df2

                                                                                                            SHA512

                                                                                                            555f347d098ffcefa2ddabebc5f3cbb7d0956b2ca02e43fbe4f629bebf03328f6187a6b7e4e09bfc82e87053d1631ae7d469dd4d95e167fabadbfa7adc4397de

                                                                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                                            Filesize

                                                                                                            126KB

                                                                                                            MD5

                                                                                                            a98318b262aee202df529fd4dfe4c4ba

                                                                                                            SHA1

                                                                                                            536831b3a0f902ba4d003871c47a967777de0959

                                                                                                            SHA256

                                                                                                            12fb1c2a561508d6cb02b9213de78383d15d5a85fcd70fe5455c988de4db0df2

                                                                                                            SHA512

                                                                                                            555f347d098ffcefa2ddabebc5f3cbb7d0956b2ca02e43fbe4f629bebf03328f6187a6b7e4e09bfc82e87053d1631ae7d469dd4d95e167fabadbfa7adc4397de

                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            9ead10c08e72ae41921191f8db39bc16

                                                                                                            SHA1

                                                                                                            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                                                                            SHA256

                                                                                                            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                                                                            SHA512

                                                                                                            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            9ead10c08e72ae41921191f8db39bc16

                                                                                                            SHA1

                                                                                                            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                                                                            SHA256

                                                                                                            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                                                                            SHA512

                                                                                                            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                                                                          • memory/1208-349-0x000001F641440000-0x000001F6416F5000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.7MB

                                                                                                          • memory/1208-348-0x0000000000030000-0x00000000002D3000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/1848-191-0x0000000140000000-0x000000014061A000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.1MB

                                                                                                          • memory/2032-379-0x000000000162F000-0x0000000001CA6000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/2032-393-0x00000000037E0000-0x0000000004332000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/2032-380-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/2104-133-0x00000000005D0000-0x00000000005D9000-memory.dmp

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                          • memory/2104-132-0x00000000004CE000-0x00000000004DE000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/2104-134-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/2104-135-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/2140-205-0x0000000002AA0000-0x0000000002C45000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                          • memory/2140-206-0x000000000B5C0000-0x000000000B8D4000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/2140-202-0x000000000B5C0000-0x000000000B8D4000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/2140-241-0x0000000002AA0000-0x0000000002C45000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                          • memory/2196-212-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/2196-215-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/2196-214-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/2196-217-0x0000000000FF0000-0x0000000000FF9000-memory.dmp

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                          • memory/2196-218-0x0000000002AF0000-0x0000000002AFD000-memory.dmp

                                                                                                            Filesize

                                                                                                            52KB

                                                                                                          • memory/2196-216-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/2220-420-0x00000151BE150000-0x00000151BE278000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2220-418-0x00000151BE150000-0x00000151BE278000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2224-307-0x00000000034E0000-0x0000000003620000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2224-361-0x0000000006B85000-0x0000000006B87000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2224-306-0x0000000002980000-0x00000000034D2000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/2224-315-0x00000000034E0000-0x0000000003620000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2224-346-0x0000000006B85000-0x0000000006B87000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2224-345-0x0000000006BC3000-0x0000000006BC5000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2224-308-0x00000000034E0000-0x0000000003620000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2224-312-0x0000000000520000-0x0000000000F52000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.2MB

                                                                                                          • memory/2224-313-0x0000000002980000-0x00000000034D2000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/2224-359-0x0000000002980000-0x00000000034D2000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/2224-360-0x0000000006BC3000-0x0000000006BC5000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2224-314-0x00000000034E0000-0x0000000003620000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/2272-178-0x000000000058D000-0x000000000059E000-memory.dmp

                                                                                                            Filesize

                                                                                                            68KB

                                                                                                          • memory/2272-179-0x00000000004E0000-0x00000000004E9000-memory.dmp

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                          • memory/2272-195-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/2272-180-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/3060-253-0x00000000004E2000-0x000000000050F000-memory.dmp

                                                                                                            Filesize

                                                                                                            180KB

                                                                                                          • memory/3060-255-0x0000000000800000-0x000000000084C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/3152-162-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3152-164-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3152-160-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3152-209-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3152-170-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3208-325-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/3208-323-0x00000000024E0000-0x0000000002635000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.3MB

                                                                                                          • memory/3208-322-0x000000000239C000-0x00000000024DC000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/3240-399-0x0000000001970000-0x00000000024C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/3240-398-0x0000000000800000-0x0000000001232000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.2MB

                                                                                                          • memory/3640-235-0x0000000001320000-0x000000000132D000-memory.dmp

                                                                                                            Filesize

                                                                                                            52KB

                                                                                                          • memory/3640-234-0x0000000001300000-0x0000000001309000-memory.dmp

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                          • memory/3640-233-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/3640-232-0x0000000000400000-0x000000000043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            252KB

                                                                                                          • memory/3692-422-0x00000000029BF000-0x0000000003036000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/3768-409-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/3768-408-0x0000000000E9D000-0x0000000000FDD000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4008-226-0x000000000212F000-0x00000000021C0000-memory.dmp

                                                                                                            Filesize

                                                                                                            580KB

                                                                                                          • memory/4068-163-0x000000000065B000-0x00000000006EC000-memory.dmp

                                                                                                            Filesize

                                                                                                            580KB

                                                                                                          • memory/4068-165-0x00000000021C0000-0x00000000022DB000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.1MB

                                                                                                          • memory/4236-182-0x0000000140000000-0x000000014061A000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.1MB

                                                                                                          • memory/4736-250-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4736-281-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4736-254-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4736-252-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4736-256-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4736-258-0x0000000060900000-0x0000000060992000-memory.dmp

                                                                                                            Filesize

                                                                                                            584KB

                                                                                                          • memory/4736-279-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                            Filesize

                                                                                                            380KB

                                                                                                          • memory/4748-372-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-300-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-299-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-298-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-297-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-296-0x00000000049C0000-0x0000000005512000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/4748-295-0x00000000049C0000-0x0000000005512000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/4748-294-0x00000000049C0000-0x0000000005512000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/4748-351-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-290-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-289-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-288-0x00000000030A0000-0x0000000003963000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-287-0x0000000002A1C000-0x0000000003093000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/4748-286-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.8MB

                                                                                                          • memory/4748-353-0x00000000049C0000-0x0000000005512000-memory.dmp

                                                                                                            Filesize

                                                                                                            11.3MB

                                                                                                          • memory/4748-302-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-304-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-303-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4748-301-0x0000000005740000-0x0000000005880000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4836-220-0x0000000002FD0000-0x0000000003175000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                          • memory/4836-204-0x000000000B790000-0x000000000BAA4000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4836-199-0x0000000002FD0000-0x0000000003175000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                          • memory/4836-200-0x000000000B790000-0x000000000BAA4000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4844-357-0x0000022998EA0000-0x0000022998FC8000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4844-337-0x0000022998EA0000-0x0000022998FC8000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4912-183-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/4912-181-0x0000000000779000-0x000000000078A000-memory.dmp

                                                                                                            Filesize

                                                                                                            68KB

                                                                                                          • memory/4968-257-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4968-227-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4968-225-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/4968-240-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB