Analysis

  • max time kernel
    75s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-05-2024 18:31

General

  • Target

    716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe

  • Size

    2.7MB

  • MD5

    d2f812118c89341715fbff0ba9530396

  • SHA1

    8e9cfa2ebe51e9f71d55b161fb13aae13ee3744f

  • SHA256

    716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d

  • SHA512

    7a1884c5b2130db511f318103ece6ae1499c1e877e4dfc39d6c83b762febea258b5921fa72ae3b413ecfc752b571b2ce33f6fa1f680461d94fc3d2f1988d6c77

  • SSDEEP

    24576:tRoBHi3buy4toE1jC6Ayo2xhWLbSPlqRvc68XzRVGvQB5VA0UC1dUUKj/LZ8j3gy:boKmo4jC6Tov2RUC1doj/wgy

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 24 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 17 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe
    "C:\Users\Admin\AppData\Local\Temp\716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\Pictures\hiOas1GqV3z5zz7kPWQph9Lq.exe
        "C:\Users\Admin\Pictures\hiOas1GqV3z5zz7kPWQph9Lq.exe"
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 384
          4⤵
          • Program crash
          PID:3848
      • C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe
        "C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4432
        • C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe
          "C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4472
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2376
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3288
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              6⤵
              • Modifies Windows Firewall
              PID:240
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:32
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2596
            • C:\Windows\System32\Conhost.exe
              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              6⤵
                PID:3780
        • C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe
          "C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4784
          • C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe
            "C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1360
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3644
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
                PID:420
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  6⤵
                  • Modifies Windows Firewall
                  PID:724
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:5048
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:652
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                5⤵
                • Executes dropped EXE
                PID:1344
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1700
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:1200
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  6⤵
                    PID:2284
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    PID:3412
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    PID:5100
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    6⤵
                      PID:2300
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      6⤵
                      • Creates scheduled task(s)
                      PID:1848
                    • C:\Windows\windefender.exe
                      "C:\Windows\windefender.exe"
                      6⤵
                        PID:2192
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          7⤵
                            PID:1016
                            • C:\Windows\SysWOW64\sc.exe
                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              8⤵
                              • Launches sc.exe
                              PID:4760
                  • C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe
                    "C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3748
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:656
                    • C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe
                      "C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:3112
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3780
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                        5⤵
                          PID:4240
                          • C:\Windows\system32\netsh.exe
                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                            6⤵
                            • Modifies Windows Firewall
                            PID:3640
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4596
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2376
                    • C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe
                      "C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2472
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3596
                      • C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe
                        "C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"
                        4⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Checks for VirtualBox DLLs, possible anti-VM trick
                        • Drops file in Windows directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:3572
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5008
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1596
                          • C:\Windows\system32\netsh.exe
                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                            6⤵
                            • Modifies Windows Firewall
                            PID:4092
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4964
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4928
                    • C:\Users\Admin\Pictures\x9gEJEXXOQq0VlTGAQEAyYDa.exe
                      "C:\Users\Admin\Pictures\x9gEJEXXOQq0VlTGAQEAyYDa.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2248
                      • C:\Users\Admin\AppData\Local\Temp\u1qg.0.exe
                        "C:\Users\Admin\AppData\Local\Temp\u1qg.0.exe"
                        4⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1944
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 2116
                          5⤵
                          • Program crash
                          PID:2540
                      • C:\Users\Admin\AppData\Local\Temp\u1qg.1.exe
                        "C:\Users\Admin\AppData\Local\Temp\u1qg.1.exe"
                        4⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:4440
                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                          "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                          5⤵
                            PID:404
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 604
                          4⤵
                          • Program crash
                          PID:2836
                      • C:\Users\Admin\Pictures\GiNvPlTouwEDWnHDe2tyvv48.exe
                        "C:\Users\Admin\Pictures\GiNvPlTouwEDWnHDe2tyvv48.exe"
                        3⤵
                        • Modifies firewall policy service
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        PID:1168
                      • C:\Users\Admin\Pictures\tZCUHFO8ACAWr47KkpPTZSnc.exe
                        "C:\Users\Admin\Pictures\tZCUHFO8ACAWr47KkpPTZSnc.exe"
                        3⤵
                          PID:420
                          • C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe
                            .\Install.exe /tEdidDDf "385118" /S
                            4⤵
                              PID:1528
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                5⤵
                                  PID:4696
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                    6⤵
                                      PID:3780
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                        7⤵
                                          PID:2504
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                            8⤵
                                              PID:3024
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                          6⤵
                                            PID:4608
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                              7⤵
                                                PID:3472
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  8⤵
                                                    PID:4784
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                6⤵
                                                  PID:4476
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    7⤵
                                                      PID:4452
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                        8⤵
                                                          PID:1368
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                      6⤵
                                                        PID:4480
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                          7⤵
                                                            PID:2112
                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                              8⤵
                                                                PID:560
                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                            6⤵
                                                              PID:3556
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                7⤵
                                                                  PID:4744
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                    8⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    PID:2540
                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                      9⤵
                                                                        PID:2944
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                5⤵
                                                                  PID:2612
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                    6⤵
                                                                      PID:4784
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                        7⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:4608
                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                          8⤵
                                                                            PID:4620
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 18:34:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe\" it /qSFdidiFAY 385118 /S" /V1 /F
                                                                      5⤵
                                                                      • Creates scheduled task(s)
                                                                      PID:2780
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"
                                                                      5⤵
                                                                        PID:904
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                          6⤵
                                                                            PID:1456
                                                                            • \??\c:\windows\SysWOW64\schtasks.exe
                                                                              schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                              7⤵
                                                                                PID:3280
                                                                      • C:\Users\Admin\Pictures\cqSHdAKIF3RrNSxPrQrxyl2S.exe
                                                                        "C:\Users\Admin\Pictures\cqSHdAKIF3RrNSxPrQrxyl2S.exe"
                                                                        3⤵
                                                                          PID:1260
                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS965A.tmp\Install.exe
                                                                            .\Install.exe /tEdidDDf "385118" /S
                                                                            4⤵
                                                                              PID:4460
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                5⤵
                                                                                  PID:4444
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                    6⤵
                                                                                      PID:2072
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                        7⤵
                                                                                          PID:2764
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                            8⤵
                                                                                              PID:4300
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                          6⤵
                                                                                            PID:924
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                              7⤵
                                                                                                PID:3372
                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                  8⤵
                                                                                                    PID:2304
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                6⤵
                                                                                                  PID:2216
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                    7⤵
                                                                                                      PID:3080
                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                        8⤵
                                                                                                          PID:5012
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                      6⤵
                                                                                                        PID:4232
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                          7⤵
                                                                                                            PID:4652
                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                              8⤵
                                                                                                                PID:4728
                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                            6⤵
                                                                                                              PID:3308
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                7⤵
                                                                                                                  PID:4596
                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                    8⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    PID:4452
                                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                      9⤵
                                                                                                                        PID:2412
                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                                                5⤵
                                                                                                                  PID:4208
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                    6⤵
                                                                                                                      PID:2368
                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                        7⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        PID:3080
                                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                          8⤵
                                                                                                                            PID:3272
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1484 -ip 1484
                                                                                                              1⤵
                                                                                                                PID:3420
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                1⤵
                                                                                                                  PID:4768
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                  1⤵
                                                                                                                    PID:4892
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2248 -ip 2248
                                                                                                                    1⤵
                                                                                                                      PID:4432
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                      1⤵
                                                                                                                        PID:3644
                                                                                                                      • C:\Windows\windefender.exe
                                                                                                                        C:\Windows\windefender.exe
                                                                                                                        1⤵
                                                                                                                          PID:3004
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1944 -ip 1944
                                                                                                                          1⤵
                                                                                                                            PID:3640
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                            1⤵
                                                                                                                              PID:3436
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe it /qSFdidiFAY 385118 /S
                                                                                                                              1⤵
                                                                                                                                PID:4808
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                  2⤵
                                                                                                                                    PID:4232
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                      3⤵
                                                                                                                                        PID:3272
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                          4⤵
                                                                                                                                            PID:1500
                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                              5⤵
                                                                                                                                                PID:3920
                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                            3⤵
                                                                                                                                              PID:3892
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                4⤵
                                                                                                                                                  PID:1116
                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                    5⤵
                                                                                                                                                      PID:4436
                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:560
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                      4⤵
                                                                                                                                                        PID:3188
                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                          5⤵
                                                                                                                                                            PID:4580
                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4360
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                            4⤵
                                                                                                                                                              PID:4828
                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1708
                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4476
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:4480
                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:2960
                                                                                                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:3932
                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:4876

                                                                                                                                                                Network

                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                Replay Monitor

                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                Downloads

                                                                                                                                                                • C:\ProgramData\Are.docx

                                                                                                                                                                  Filesize

                                                                                                                                                                  11KB

                                                                                                                                                                  MD5

                                                                                                                                                                  a33e5b189842c5867f46566bdbf7a095

                                                                                                                                                                  SHA1

                                                                                                                                                                  e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                                                                                  SHA256

                                                                                                                                                                  5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                                                                                  SHA512

                                                                                                                                                                  f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                                                                                • C:\ProgramData\mozglue.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  593KB

                                                                                                                                                                  MD5

                                                                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                  SHA1

                                                                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                  SHA256

                                                                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                  SHA512

                                                                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                • C:\ProgramData\nss3.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.0MB

                                                                                                                                                                  MD5

                                                                                                                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                  SHA1

                                                                                                                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                  SHA256

                                                                                                                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                  SHA512

                                                                                                                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                  Filesize

                                                                                                                                                                  2KB

                                                                                                                                                                  MD5

                                                                                                                                                                  ac4917a885cf6050b1a483e4bc4d2ea5

                                                                                                                                                                  SHA1

                                                                                                                                                                  b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                                                                                                                                                                  SHA256

                                                                                                                                                                  e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                                                                                                                                                                  SHA512

                                                                                                                                                                  092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  20KB

                                                                                                                                                                  MD5

                                                                                                                                                                  c274a36fea1934e25c473ec97f80ace0

                                                                                                                                                                  SHA1

                                                                                                                                                                  731f0e6761e3d58dedc49f62f6e413d01747c2f6

                                                                                                                                                                  SHA256

                                                                                                                                                                  cc0649046d856e4b2453d87a21db3e136cefcff2dfc256e38c6213c4decbb3c1

                                                                                                                                                                  SHA512

                                                                                                                                                                  4eee80d37752f98493ff6294c4f42544dd64935bccf4d5f5f83ca2b53eec3720654b9964ca8b70cce2f0b3b3ec82f35c68a9d631938a599a034d9668087898b1

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  20KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e75f0459db104ce32b1909a120760275

                                                                                                                                                                  SHA1

                                                                                                                                                                  05a26d9172db39a2b0189fe233e4fba73c8a4a6e

                                                                                                                                                                  SHA256

                                                                                                                                                                  c37847be272938de40d2f63d22a1d5d10460889ffce6abd1ce8f910c74a4d46c

                                                                                                                                                                  SHA512

                                                                                                                                                                  ed04a3e73ce02989159c5a9e8b9ca8213a8b6a9b2ccfc7ea847c890a7e04b890274951b74ead23c03cf4c3c8865ee10014809ec97627f0ebcd6f8d6a9579509e

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                  Filesize

                                                                                                                                                                  15KB

                                                                                                                                                                  MD5

                                                                                                                                                                  2bf90d7b3eb95d34770a2f76ef7ceb54

                                                                                                                                                                  SHA1

                                                                                                                                                                  710adbbde0a028b23d18d51f8dfe0100955904b7

                                                                                                                                                                  SHA256

                                                                                                                                                                  884fdfae70b18ed9bead94dde9aec9b85eff1968f25852b0c14f9418e4eb7c11

                                                                                                                                                                  SHA512

                                                                                                                                                                  eda2e6631a6e8b41dbabfe8a9d1eaf71285e112f338228705988ba6be96e6940c56630262eca8465882b36ea92424633baac31de44d5ab738c74de4b4c3b0815

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                  Filesize

                                                                                                                                                                  11KB

                                                                                                                                                                  MD5

                                                                                                                                                                  5c2999f6cc9d91fcf0cb726efa58d270

                                                                                                                                                                  SHA1

                                                                                                                                                                  365ea334e92b02cf56a47e5b4e17002b870c9969

                                                                                                                                                                  SHA256

                                                                                                                                                                  17dead7a7cfb40125cbda72cc532ac6227b97cbf878f23a0ca7f0f60e784c103

                                                                                                                                                                  SHA512

                                                                                                                                                                  adc469a149bc07ac5e56ec6ea9e1f7fa87b0d1f4c1f448d239b86df6cfdb5032824125d223581b462d14e719124baed27ac9aacebe119821a8c7eaf55b217a0d

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  6.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  220a02a940078153b4063f42f206087b

                                                                                                                                                                  SHA1

                                                                                                                                                                  02fc647d857573a253a1ab796d162244eb179315

                                                                                                                                                                  SHA256

                                                                                                                                                                  7eb93d93b03447a6bafd7e084305d41bf9780bd415cb2e70020952d06f3d7b60

                                                                                                                                                                  SHA512

                                                                                                                                                                  42ac563a7c28cbf361bfb150d5469f0278ab87ce445b437eef8425fb779689d70230b550815f30f9db2909c1ba0dd015b172dfe3e718d26706856f4cb0eeeeaa

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_obyniuqq.jhp.ps1

                                                                                                                                                                  Filesize

                                                                                                                                                                  60B

                                                                                                                                                                  MD5

                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                  SHA1

                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                  SHA256

                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                  SHA512

                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  281KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d98e33b66343e7c96158444127a117f6

                                                                                                                                                                  SHA1

                                                                                                                                                                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                                                                                                                  SHA256

                                                                                                                                                                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                                                                                                                  SHA512

                                                                                                                                                                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                  Filesize

                                                                                                                                                                  2KB

                                                                                                                                                                  MD5

                                                                                                                                                                  c8309737f10fef2f8431635dfe0d38dc

                                                                                                                                                                  SHA1

                                                                                                                                                                  1bb266ed7e8c4da0277d327e0331ae7e3823fcbd

                                                                                                                                                                  SHA256

                                                                                                                                                                  6b066aa8bd4db47d32b9b11413bebf2172af03060dee6460a26c2fda599455cc

                                                                                                                                                                  SHA512

                                                                                                                                                                  9cc3b6df34c88dad8b90eaca092154eed657f87c32db418205486b1d4fc416c683c5390c3d16f8d97cd02d016a9cfb5f1fa49bd10bc3a4305d9e3fabd3313391

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                  Filesize

                                                                                                                                                                  3KB

                                                                                                                                                                  MD5

                                                                                                                                                                  eacc2e79a69500889d4e7f1e331f8bdf

                                                                                                                                                                  SHA1

                                                                                                                                                                  1d5db0c129e639d4c423fbf5e83fca5e0b737567

                                                                                                                                                                  SHA256

                                                                                                                                                                  011bec1c3f332ba15b05abfffbaf228f6556516e93d586c8a189aa20ed795f5b

                                                                                                                                                                  SHA512

                                                                                                                                                                  c38e31562578942a3ab49c7a8abfdeca5d318b510b356d8598cc58a6140d7a5ab0a17ae9b4f5dac4bcee3ca6a7230f00e6380395bcdd2164d27478cfcf4bb88a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\u1qg.0.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  231KB

                                                                                                                                                                  MD5

                                                                                                                                                                  eabfdaca74d258561209e731259bf818

                                                                                                                                                                  SHA1

                                                                                                                                                                  5bf324d6792cef6cb1663c88002480029aa8c1a8

                                                                                                                                                                  SHA256

                                                                                                                                                                  8122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b

                                                                                                                                                                  SHA512

                                                                                                                                                                  42277497bb262f951f066b1e069c57173832b5cc7697111c80b1a5f95f769fed4a3cc6ff4d96d8ad78f60690fec2a1a7497d8f0b24a6971fd70a67ac63f32ef3

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\u1qg.1.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.6MB

                                                                                                                                                                  MD5

                                                                                                                                                                  397926927bca55be4a77839b1c44de6e

                                                                                                                                                                  SHA1

                                                                                                                                                                  e10f3434ef3021c399dbba047832f02b3c898dbd

                                                                                                                                                                  SHA256

                                                                                                                                                                  4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                                                                                                                                                  SHA512

                                                                                                                                                                  cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                                                                                                                                                • C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  aa21cc00b06fa9cf4f2f2986a2ce7730

                                                                                                                                                                  SHA1

                                                                                                                                                                  b7c47a82c88295631ac59e69561b2032d3bdf561

                                                                                                                                                                  SHA256

                                                                                                                                                                  4b75302f0298a6fcd0beb9f1798a64be19221c238bb18c274f1454548165a76b

                                                                                                                                                                  SHA512

                                                                                                                                                                  01ffed899607f8813cf27d988cd59071e4c7e995b666c5a9fce000640103af5efb3ca8281c16074aafc148ea686e8c6c0acd6aae82ae6fce2ad076b2b83db345

                                                                                                                                                                • C:\Users\Admin\Pictures\GiNvPlTouwEDWnHDe2tyvv48.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  411602e57a0df5f835f74066f38bc84c

                                                                                                                                                                  SHA1

                                                                                                                                                                  7207ef4fbc5ae0145c3dbcd10d8cdb1b22287c30

                                                                                                                                                                  SHA256

                                                                                                                                                                  2f1e42016a3f2cfa0817f49ebd0e765c07d87b4692a14df7c8b38232422060ff

                                                                                                                                                                  SHA512

                                                                                                                                                                  87bd2b7770462a17368ab3a3278c3f3ef6bf873e6b2c83179025ad348730f14ced5461ab0a6ebf81236ec83c2c1eef0faf73479a6d40ad9ed198e9c3011eaa7d

                                                                                                                                                                • C:\Users\Admin\Pictures\U8NEwK5XxxYDuDYWTpFidEqM.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  7KB

                                                                                                                                                                  MD5

                                                                                                                                                                  77f762f953163d7639dff697104e1470

                                                                                                                                                                  SHA1

                                                                                                                                                                  ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                                                                                                                                                                  SHA256

                                                                                                                                                                  d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                                                                                                                                                                  SHA512

                                                                                                                                                                  d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                                                                                                                                                                • C:\Users\Admin\Pictures\hiOas1GqV3z5zz7kPWQph9Lq.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  231KB

                                                                                                                                                                  MD5

                                                                                                                                                                  405dd6e9634a6adb16f3cdb649d67d2c

                                                                                                                                                                  SHA1

                                                                                                                                                                  426d37976e43aaa653671eb596ceab300c930b55

                                                                                                                                                                  SHA256

                                                                                                                                                                  10e744b0e7b3e177e009fad374f8a9a407c542dcc9fb3b4b332e2ea18c57e86f

                                                                                                                                                                  SHA512

                                                                                                                                                                  4ca4faf5a7e83b24140fffae421a7b4ed286cedcd9407b153b5f31d6f5f2bd31911597f6567ae8388fe2fcc137fbc95397d5401f5477b1044e3b51e3207138df

                                                                                                                                                                • C:\Users\Admin\Pictures\tZCUHFO8ACAWr47KkpPTZSnc.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  6.2MB

                                                                                                                                                                  MD5

                                                                                                                                                                  5cc472dcd66120aed74de36341bfd75a

                                                                                                                                                                  SHA1

                                                                                                                                                                  1dfc4d42da90fe070d4474ddd7fa7b6f6ffa97ab

                                                                                                                                                                  SHA256

                                                                                                                                                                  958dd14c90b1c73852f926608f212377aa3a36666c04024f97c20deb375e9773

                                                                                                                                                                  SHA512

                                                                                                                                                                  b5cf358d95ec9a6cca81d2e9c23f0ede93ab94963bb5c626f4e6233a06cedae63b73dd81d2455acb29b003c3b4e2f54da6010daebc4639a3dcc54314d4fe4f81

                                                                                                                                                                • C:\Users\Admin\Pictures\x9gEJEXXOQq0VlTGAQEAyYDa.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  372KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d0408852e9e32afcbd649688e7468b6b

                                                                                                                                                                  SHA1

                                                                                                                                                                  83a10133dc3a52c50dcc9d6143a5fa1abdb47076

                                                                                                                                                                  SHA256

                                                                                                                                                                  57d32a6ee7ded04e612eb459fdd91b232009f253a86038ab2798f66b760daef6

                                                                                                                                                                  SHA512

                                                                                                                                                                  663c6f97808da4b47a642b0043a1df11465cc11f193def532ef69368cf39baf7db0038a49bb67a512cfbbd98490af4dd9bc586d033fc67470af1b8afa235e6fd

                                                                                                                                                                • C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  81973860f6243f10498dcae7cbce588d

                                                                                                                                                                  SHA1

                                                                                                                                                                  1aef2304fc626b033912e0b3f3bd9e82128de110

                                                                                                                                                                  SHA256

                                                                                                                                                                  db54e1ea122f80356ecc745695afb947589efa854e962780359ca58fa5f04eb5

                                                                                                                                                                  SHA512

                                                                                                                                                                  b2a0714f5b9bc5fb5cc03f26e526b64cc592ad89312ba753180ce2afa375e3305f021af27b40afc0ef13d405c2b9364cdfc574efa186b1b512cfe0a42edab281

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                  Filesize

                                                                                                                                                                  2KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d0c46cad6c0778401e21910bd6b56b70

                                                                                                                                                                  SHA1

                                                                                                                                                                  7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                                                                                                                                  SHA256

                                                                                                                                                                  9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                                                                                                                                  SHA512

                                                                                                                                                                  057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  1c9757c66c3f63f8492d7c54991ca971

                                                                                                                                                                  SHA1

                                                                                                                                                                  b1fe3342d8277e472f00ed37e1fe7e5edd9116d4

                                                                                                                                                                  SHA256

                                                                                                                                                                  fc3a58e5678629200a54fa8d01fd9379fa9e1421a39009ec197cadfb175eedba

                                                                                                                                                                  SHA512

                                                                                                                                                                  368b29ece0fe592e8b967565149c926cc74bc7cb9f3036e05bb4d4d981fd4cab0772bff3d858dc2d4fa78291648b6311a5849273f483851347f9a606c19298dc

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  1e4d727200ab20ca66974b90101aee7b

                                                                                                                                                                  SHA1

                                                                                                                                                                  b069b045fa4c7072c7cc75888ef74c5b606976a5

                                                                                                                                                                  SHA256

                                                                                                                                                                  5a7206519e595939b23921d505c3ed4e378d2c9544d7b6d6070c3b1cc1a784e6

                                                                                                                                                                  SHA512

                                                                                                                                                                  1830cdfb787da4cbb578692c783aabd41ef39665b6959233ee6af4ea7754643fbf6484a7bbd5b2bb25a31958124ee60eb87c2634d5733bb2a5bfd618d445c51b

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d2cbbe95ec7caca0dab3ad56d999a3fb

                                                                                                                                                                  SHA1

                                                                                                                                                                  adfa3bf5efc770eb97c024a3e996683c10e1f4f2

                                                                                                                                                                  SHA256

                                                                                                                                                                  9e53c9c45d7d1e3113da0ca5903ddce835e1e956f7cf78323fcdc9f419850b03

                                                                                                                                                                  SHA512

                                                                                                                                                                  2026d415a557dfbea05028e5d1dec35e0db10cd845e4dd5678c6b66b2a6d66ab623f244d371d01dd8b2423ae0bc2347acae327fc622993a8be1d4575adc60fd3

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  b364c5eaa81b5fea13ab6afbc5c40b07

                                                                                                                                                                  SHA1

                                                                                                                                                                  973d101d71cdc32ae604253ac98eecc42bf0fa5a

                                                                                                                                                                  SHA256

                                                                                                                                                                  f268bda4b34f5636fae9f753c2f1450dcbb7ca30d48051c9aa0f8971e55928f2

                                                                                                                                                                  SHA512

                                                                                                                                                                  a942cf32d983a552c7d4eae78f60630771399a1aed2dda814e6e9343db3dc84871d142dac84f3eb30a6004999f138d15afb1375b5ac87ec1d010a242896d62d6

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  afeb66dc62e096de52ad3e54e638a60f

                                                                                                                                                                  SHA1

                                                                                                                                                                  99ee23b59a67c08bb5b16519a5170a7f2dd9ed3d

                                                                                                                                                                  SHA256

                                                                                                                                                                  f3dad3f659618a0ff8f8eaa90deeb51dd3cdeb3b5826864b671863d5c550554e

                                                                                                                                                                  SHA512

                                                                                                                                                                  c721d8c58e4f44b0331fb2f9e3d93d4ec1c2d552c50eb7bc643617fc5af0f33af71476093d121028cbe7fa9e9a49689e9008ac9bce7ca31897e378f31275ed1e

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d1c9d030aef6919499cf7c42c5ee40cd

                                                                                                                                                                  SHA1

                                                                                                                                                                  f5db08c31fcb36a9494565cfd63b24f245e0858a

                                                                                                                                                                  SHA256

                                                                                                                                                                  602080feceb65f4c549827bcddcef3eed5df2a5dc6f488d986c4a3834435aa14

                                                                                                                                                                  SHA512

                                                                                                                                                                  9c5a2342eb04c8272944da70bf071bb278e86d28cd0c9c4f6121d28250103b9a63e506080f8c323a4bccf32bb24f113430e86ea26e5b4bbcc9fce40e8bb3a420

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  25b3292f768cd821e02a338132f9aac6

                                                                                                                                                                  SHA1

                                                                                                                                                                  e80348c27181bef677607a402a357b237c749149

                                                                                                                                                                  SHA256

                                                                                                                                                                  b085594abaed68638f791339b556e3045891508d429bd0b1bc12df4b8ec2eb2f

                                                                                                                                                                  SHA512

                                                                                                                                                                  e42ef94e5ae68964fc79b61cc6417b7d4e9cb27d51187fc203f792f2f0a8f9ddbf0dad212d88686d3e426dfe8f00d83f34a4cf0c84f81ba6d5bb6637d500fcad

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e8e2dfc4705fc1474fce8d88d0561691

                                                                                                                                                                  SHA1

                                                                                                                                                                  c579d9f1c7d06e6aa0eabb9c3247d532b74aa4c3

                                                                                                                                                                  SHA256

                                                                                                                                                                  46e8190f54f5fa129abae65435e504c4b882d73144f405ef20292c2305738ad1

                                                                                                                                                                  SHA512

                                                                                                                                                                  a5cdb5198d73f5946547df6d8a99c69f4db98f46cd9df1b2a450a2751cde36b717246ed4c07ec90d3d2e0dd4055271318ea028e4ab3066e7a83509948f8d5d4a

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  913d54d30d25b498935b712420447584

                                                                                                                                                                  SHA1

                                                                                                                                                                  5ea42b46f7c6756879f3caa388cbf9357d211f49

                                                                                                                                                                  SHA256

                                                                                                                                                                  f9478e50fa3296fd3e06d77107165173eb122eb5fa7c7193dd4c8067d6a23a25

                                                                                                                                                                  SHA512

                                                                                                                                                                  dbba2aaf2e947de4b10f17dcd873a18c0c8a82cc61ed50ac6d0438ab6018d6aa6e4c06ff9d28d18877064a6cc106b1f1315ed4562d24b162b0d16b68dbbc8398

                                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                  Filesize

                                                                                                                                                                  19KB

                                                                                                                                                                  MD5

                                                                                                                                                                  6b99df2d3412dc17b3d61bc8971bd382

                                                                                                                                                                  SHA1

                                                                                                                                                                  40c0c078f3fb1edc97f5d4deacae70fae659df7a

                                                                                                                                                                  SHA256

                                                                                                                                                                  ab8b8bcd4f3a0a9be3cb9e800ab70135581b4cd35b73dedd8ef41ac4c04f7ae5

                                                                                                                                                                  SHA512

                                                                                                                                                                  2413080733c2b53fbda4115653b7246bfa81fe0677cfed04dc61d4a52f98332d004bdb8e8f18fe845da25492bb103d07f13537cf0dbb21a8eb662e22b0d44774

                                                                                                                                                                • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                  Filesize

                                                                                                                                                                  127B

                                                                                                                                                                  MD5

                                                                                                                                                                  8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                  SHA1

                                                                                                                                                                  a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                  SHA256

                                                                                                                                                                  9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                  SHA512

                                                                                                                                                                  5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                  Filesize

                                                                                                                                                                  1KB

                                                                                                                                                                  MD5

                                                                                                                                                                  cdfd60e717a44c2349b553e011958b85

                                                                                                                                                                  SHA1

                                                                                                                                                                  431136102a6fb52a00e416964d4c27089155f73b

                                                                                                                                                                  SHA256

                                                                                                                                                                  0ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f

                                                                                                                                                                  SHA512

                                                                                                                                                                  dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8

                                                                                                                                                                • C:\Windows\windefender.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.0MB

                                                                                                                                                                  MD5

                                                                                                                                                                  8e67f58837092385dcf01e8a2b4f5783

                                                                                                                                                                  SHA1

                                                                                                                                                                  012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                                                                                                                  SHA256

                                                                                                                                                                  166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                                                                                                                  SHA512

                                                                                                                                                                  40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                                                                                                                • memory/32-402-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/32-401-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/32-411-0x00000000079D0000-0x0000000007A74000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  656KB

                                                                                                                                                                • memory/32-442-0x0000000006570000-0x0000000006585000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  84KB

                                                                                                                                                                • memory/404-723-0x000001977EF00000-0x000001977EF22000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  136KB

                                                                                                                                                                • memory/404-720-0x000001971A690000-0x000001971A742000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  712KB

                                                                                                                                                                • memory/404-728-0x000001971A770000-0x000001971AA70000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.0MB

                                                                                                                                                                • memory/404-724-0x000001971A050000-0x000001971A05A000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/404-713-0x000001977B2D0000-0x000001977EB04000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  56.2MB

                                                                                                                                                                • memory/404-722-0x000001977EF50000-0x000001977EFA0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  320KB

                                                                                                                                                                • memory/404-714-0x000001971A350000-0x000001971A45A000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.0MB

                                                                                                                                                                • memory/404-716-0x000001971A1D0000-0x000001971A1DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  48KB

                                                                                                                                                                • memory/404-715-0x000001971A1B0000-0x000001971A1C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/404-717-0x000001971A1C0000-0x000001971A1D4000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  80KB

                                                                                                                                                                • memory/404-721-0x000001971A740000-0x000001971A76A000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  168KB

                                                                                                                                                                • memory/404-719-0x000001971A4E0000-0x000001971A4EA000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/404-718-0x000001971A4B0000-0x000001971A4D4000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  144KB

                                                                                                                                                                • memory/652-488-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/652-487-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/656-138-0x0000000006F90000-0x0000000006FAE000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  120KB

                                                                                                                                                                • memory/656-129-0x000000006F570000-0x000000006F8C7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/656-128-0x000000006F520000-0x000000006F56C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/656-200-0x0000000007140000-0x0000000007151000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  68KB

                                                                                                                                                                • memory/656-127-0x0000000006F50000-0x0000000006F84000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  208KB

                                                                                                                                                                • memory/656-140-0x0000000006FB0000-0x0000000007054000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  656KB

                                                                                                                                                                • memory/1168-171-0x0000000140000000-0x00000001403BD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.7MB

                                                                                                                                                                • memory/1168-226-0x0000000140000000-0x00000001403BD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.7MB

                                                                                                                                                                • memory/1344-666-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/1360-563-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/1360-523-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/1360-358-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/1484-79-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.5MB

                                                                                                                                                                • memory/1596-219-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/1700-596-0x0000000005FB0000-0x0000000006307000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/1700-641-0x00000000077D0000-0x0000000007874000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  656KB

                                                                                                                                                                • memory/1700-642-0x00000000079A0000-0x00000000079B1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  68KB

                                                                                                                                                                • memory/1700-606-0x00000000065B0000-0x00000000065FC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/1700-643-0x0000000006350000-0x0000000006365000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  84KB

                                                                                                                                                                • memory/1700-629-0x000000006ED80000-0x000000006EDCC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/1700-630-0x000000006EE90000-0x000000006F1E7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/1944-400-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.5MB

                                                                                                                                                                • memory/1944-227-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.5MB

                                                                                                                                                                • memory/1944-575-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.5MB

                                                                                                                                                                • memory/1944-628-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.5MB

                                                                                                                                                                • memory/1944-273-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  972KB

                                                                                                                                                                • memory/2196-216-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/2248-222-0x0000000000400000-0x0000000002599000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.6MB

                                                                                                                                                                • memory/2248-541-0x0000000000400000-0x0000000002599000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.6MB

                                                                                                                                                                • memory/2248-126-0x0000000000400000-0x0000000002599000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  33.6MB

                                                                                                                                                                • memory/2376-500-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/2376-318-0x000000006EA20000-0x000000006ED77000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/2376-501-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/2376-317-0x000000006FA70000-0x000000006FABC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/2472-221-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/2472-83-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/2596-477-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/2596-476-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/2664-3-0x000000007487E000-0x000000007487F000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2664-228-0x000000007487E000-0x000000007487F000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2664-1-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/2664-254-0x0000000074870000-0x0000000075021000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  7.7MB

                                                                                                                                                                • memory/2664-4-0x0000000074870000-0x0000000075021000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  7.7MB

                                                                                                                                                                • memory/3112-568-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3112-526-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3112-398-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3380-2-0x00007FF7161F0000-0x00007FF716539000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/3380-0-0x00007FF7161F0000-0x00007FF716539000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/3412-655-0x000000006EE90000-0x000000006F1E7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/3412-654-0x000000006ED80000-0x000000006EDCC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/3572-357-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3572-571-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3572-521-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3596-159-0x000000006F570000-0x000000006F8C7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/3596-88-0x0000000005F70000-0x0000000005FD6000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  408KB

                                                                                                                                                                • memory/3596-157-0x000000006F520000-0x000000006F56C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/3596-197-0x0000000007D00000-0x0000000007D96000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  600KB

                                                                                                                                                                • memory/3644-338-0x000000006FA70000-0x000000006FABC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/3644-339-0x000000006EA20000-0x000000006ED77000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/3748-220-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/3780-328-0x000000006FA70000-0x000000006FABC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/3780-329-0x000000006EA20000-0x000000006ED77000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4432-85-0x0000000002B50000-0x0000000002B86000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  216KB

                                                                                                                                                                • memory/4432-86-0x0000000005280000-0x00000000058AA000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  6.2MB

                                                                                                                                                                • memory/4432-183-0x00000000075C0000-0x00000000075DA000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  104KB

                                                                                                                                                                • memory/4432-203-0x00000000076D0000-0x00000000076EA000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  104KB

                                                                                                                                                                • memory/4432-124-0x0000000006370000-0x00000000063BC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4432-125-0x00000000065A0000-0x00000000065E6000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  280KB

                                                                                                                                                                • memory/4432-202-0x0000000007680000-0x0000000007695000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  84KB

                                                                                                                                                                • memory/4432-201-0x0000000007670000-0x000000000767E000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  56KB

                                                                                                                                                                • memory/4432-182-0x0000000007C00000-0x000000000827A000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  6.5MB

                                                                                                                                                                • memory/4432-204-0x00000000076C0000-0x00000000076C8000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/4432-98-0x0000000005C30000-0x0000000005F87000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4432-89-0x00000000058B0000-0x0000000005916000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  408KB

                                                                                                                                                                • memory/4432-87-0x0000000005150000-0x0000000005172000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  136KB

                                                                                                                                                                • memory/4432-195-0x0000000007600000-0x000000000760A000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/4432-139-0x000000006F520000-0x000000006F56C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4432-123-0x0000000006020000-0x000000000603E000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  120KB

                                                                                                                                                                • memory/4432-141-0x000000006F570000-0x000000006F8C7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4440-633-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4472-397-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/4472-524-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/4472-576-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  37.3MB

                                                                                                                                                                • memory/4596-412-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4596-393-0x0000000006460000-0x00000000064AC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4596-413-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4596-364-0x0000000005ED0000-0x0000000006227000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4784-173-0x000000006F570000-0x000000006F8C7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4784-172-0x000000006F520000-0x000000006F56C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4928-551-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4928-550-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/4928-566-0x0000000006710000-0x0000000006721000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  68KB

                                                                                                                                                                • memory/4928-567-0x0000000006750000-0x0000000006765000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  84KB

                                                                                                                                                                • memory/4964-415-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/4964-414-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/5008-307-0x000000006EA20000-0x000000006ED77000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/5008-233-0x00000000060C0000-0x0000000006417000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/5008-256-0x0000000006590000-0x00000000065DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/5008-306-0x000000006FA70000-0x000000006FABC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/5008-316-0x00000000077D0000-0x0000000007874000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  656KB

                                                                                                                                                                • memory/5008-327-0x0000000007AF0000-0x0000000007B01000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  68KB

                                                                                                                                                                • memory/5008-348-0x0000000007B40000-0x0000000007B55000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  84KB

                                                                                                                                                                • memory/5048-433-0x000000006EF80000-0x000000006F2D7000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/5048-432-0x000000006EED0000-0x000000006EF1C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/5100-679-0x000000006EE30000-0x000000006F187000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB

                                                                                                                                                                • memory/5100-678-0x000000006ED80000-0x000000006EDCC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  304KB

                                                                                                                                                                • memory/5100-676-0x0000000006500000-0x0000000006857000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.3MB