Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2022 19:31

General

  • Target

    windows.10.codec.pack.v2.2.0.setup.exe

  • Size

    45.5MB

  • MD5

    908ea32c938f24669728a7c026a6552b

  • SHA1

    2695b6cd468636b09c1495a86a69ce4f56203a0c

  • SHA256

    435506cbe66bebdfdf9a2a94b1e8f483fdf108ab308129a6eb8dfd56a8bc77bc

  • SHA512

    342281df3e8823dbca8231335c17d76fbc4d0ba35a97c2d777d11c9ca33b86e689ef54c86aebbbec50a6f499b7232c4d56406f0471cce666a74203bfe95e710e

  • SSDEEP

    786432:Zbe52lsoZacQr5el64WTdDUCpGnSlyXMs8AdIqCmF3kdPEcOKbBhscBpw4yTie6d:ZbpHZac09DtpI7XMvmIqoPppw4yees

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 5 IoCs
  • Executes dropped EXE 64 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windows.10.codec.pack.v2.2.0.setup.exe
    "C:\Users\Admin\AppData\Local\Temp\windows.10.codec.pack.v2.2.0.setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks for any installed AV software in registry
    • Drops file in System32 directory
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4504
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:672
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4756
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4304
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:2204
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:2592
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4228
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4916
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:3188
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:3996
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4656
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4204
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:3268
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:388
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:1860
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:4292
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:1552
    • C:\Windows\SysWOW64\Codecs\SetACL.exe
      "C:\Windows\system32\Codecs\SetACL.exe" "MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" /registry /grant S-1-5-32-544 /full /r:cont_obj /sid /silent
      2⤵
      • Executes dropped EXE
      PID:724
    • C:\Windows\system32\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\ffdshow.ax
      2⤵
        PID:2576
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\avi.x64.dll
        2⤵
        • Registers COM server for autorun
        PID:4228
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\dxr.x64.dll
        2⤵
          PID:1604
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\mkx.x64.dll
          2⤵
          • Registers COM server for autorun
          PID:4660
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\mp4.x64.dll
          2⤵
          • Registers COM server for autorun
          PID:548
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\ogm.x64.dll
          2⤵
            PID:2756
          • C:\Windows\system32\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\ts.x64.dll
            2⤵
              PID:3880
            • C:\Windows\system32\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\splitter.x64.ax
              2⤵
                PID:2168
              • C:\Windows\system32\regsvr32.exe
                "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\VSFilter.dll
                2⤵
                • Registers COM server for autorun
                • Modifies registry class
                PID:2188
              • C:\Windows\system32\regsvr32.exe
                "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\cdxareader.ax
                2⤵
                  PID:904
                • C:\Windows\system32\regsvr32.exe
                  "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\LAVSplitter.ax
                  2⤵
                    PID:1240
                  • C:\Windows\system32\regsvr32.exe
                    "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\LAVVideo.ax
                    2⤵
                      PID:4720
                    • C:\Windows\system32\regsvr32.exe
                      "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\LAVAudio.ax
                      2⤵
                        PID:2140
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\\Regasm.exe" "C:\Windows\SysWOW64\IcarosPropertyHandler.dll" /silent /codebase
                        2⤵
                          PID:4200
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Regasm.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\\Regasm.exe" "C:\Windows\system32\IcarosPropertyHandler.dll" /silent /codebase
                          2⤵
                            PID:2376
                          • C:\Windows\system32\regsvr32.exe
                            "C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\IcarosThumbnailProvider.dll
                            2⤵
                              PID:3444
                            • C:\Windows\SysWOW64\Codecs\TrayMenu.exe
                              C:\Windows\SysWOW64\Codecs\TrayMenu.exe
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:3540
                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                              2⤵
                                PID:2848
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                2⤵
                                • Registers COM server for autorun
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:2576
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4632
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4908
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                2⤵
                                • Executes dropped EXE
                                • Registers COM server for autorun
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2140
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4180
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:800
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4688
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                2⤵
                                • Executes dropped EXE
                                • Registers COM server for autorun
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1240
                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                2⤵
                                  PID:4664
                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4392
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2848
                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4476
                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2284
                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4604
                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                  2⤵
                                    PID:2468
                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                    2⤵
                                    • Executes dropped EXE
                                    • Registers COM server for autorun
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4720
                                    • C:\Windows\System32\Conhost.exe
                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4664
                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                    2⤵
                                      PID:1748
                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3636
                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                      2⤵
                                      • Executes dropped EXE
                                      PID:2460
                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                      2⤵
                                        PID:4624
                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                        2⤵
                                          PID:1748
                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4776
                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4328
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            3⤵
                                              PID:3444
                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                            2⤵
                                              PID:4088
                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1372
                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                              2⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              PID:2148
                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                              2⤵
                                                PID:380
                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                2⤵
                                                • Executes dropped EXE
                                                PID:676
                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                2⤵
                                                  PID:408
                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                  2⤵
                                                    PID:812
                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                    2⤵
                                                      PID:4520
                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                      2⤵
                                                        PID:1532
                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                        2⤵
                                                          PID:8
                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                          2⤵
                                                          • Registers COM server for autorun
                                                          PID:3880
                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                          2⤵
                                                            PID:4288
                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                            2⤵
                                                              PID:1084
                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                              2⤵
                                                                PID:4380
                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                2⤵
                                                                  PID:2632
                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                  2⤵
                                                                    PID:1060
                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                    2⤵
                                                                      PID:1336
                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                      2⤵
                                                                        PID:4484
                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                        2⤵
                                                                          PID:4880
                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                          2⤵
                                                                            PID:3964
                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                            2⤵
                                                                              PID:2696
                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                              2⤵
                                                                                PID:2968
                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                2⤵
                                                                                  PID:2632
                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2576
                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                                  2⤵
                                                                                    PID:672
                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                    2⤵
                                                                                      PID:2592
                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                                      2⤵
                                                                                        PID:1336
                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                        2⤵
                                                                                          PID:4436
                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                                          2⤵
                                                                                            PID:812
                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                            2⤵
                                                                                              PID:1084
                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                                              2⤵
                                                                                                PID:3136
                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                                2⤵
                                                                                                  PID:4764
                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-32-544;s:y -silent
                                                                                                  2⤵
                                                                                                    PID:4488
                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:full -silent
                                                                                                    2⤵
                                                                                                      PID:3216
                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                      2⤵
                                                                                                        PID:2632
                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                        2⤵
                                                                                                          PID:4572
                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                          2⤵
                                                                                                            PID:3812
                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                            2⤵
                                                                                                              PID:4380
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                3⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:380
                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                              2⤵
                                                                                                                PID:1212
                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                2⤵
                                                                                                                  PID:4088
                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                  2⤵
                                                                                                                    PID:2492
                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                    2⤵
                                                                                                                      PID:1280
                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                      2⤵
                                                                                                                        PID:1816
                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                        2⤵
                                                                                                                          PID:2632
                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                          2⤵
                                                                                                                            PID:1532
                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:8
                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                            2⤵
                                                                                                                              PID:4676
                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                              2⤵
                                                                                                                                PID:812
                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                2⤵
                                                                                                                                  PID:5096
                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                  2⤵
                                                                                                                                    PID:4020
                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                    2⤵
                                                                                                                                      PID:2696
                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        3⤵
                                                                                                                                          PID:672
                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                        2⤵
                                                                                                                                          PID:1816
                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                          2⤵
                                                                                                                                            PID:4600
                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                            2⤵
                                                                                                                                              PID:4572
                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                              2⤵
                                                                                                                                                PID:4088
                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                2⤵
                                                                                                                                                  PID:2752
                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                  2⤵
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                  PID:3416
                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                  2⤵
                                                                                                                                                    PID:4880
                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1084
                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                      2⤵
                                                                                                                                                        PID:4436
                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3380
                                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4880
                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4488
                                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4292
                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                2⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:1084
                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:4764
                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:1748
                                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:4292
                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:4288
                                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:4912
                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:4520
                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:1424
                                                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:3868
                                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:4576
                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1816
                                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4020
                                                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:4764
                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Suspicious behavior: LoadsDriver
                                                                                                                                                                                    PID:3380
                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:3136
                                                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:4624
                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4912
                                                                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:2968
                                                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4288
                                                                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4932
                                                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:1280
                                                                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:5096
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                                    • Modifies system certificate store
                                                                                                                                                                                                    PID:3812
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:4116
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectShow\Preferred -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4624
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3964
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:4824
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MediaFoundation\MediaSources\DoNotUse -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4624
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4288
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4576
                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:4932
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.avi" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:5096
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:1208
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:4764
                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:2968
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4a" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4576
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:812
                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                  PID:4624
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:4500
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.m4v" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:3368
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:1336
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:812
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:2492
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn setowner -ownr n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y -silent
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:1420
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                            C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn ace -ace n:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464;s:y;p:full -silent
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            PID:812
                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4020
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Codecs\SetACL.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Codecs\SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4v" -ot reg -actn ace -ace n:S-1-5-32-544;s:y;p:read -silent
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:2240
                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                  PID:4600
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\rsStubActivator.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\rsStubActivator.exe" -ip:"dui=091594cdfa6b72c8d4f606ef98dbf92357352f2a&dit=20221222203253429&is_silent=true&oc=DOT_RAV_Cross_Tri_NCB&p=0535&a=100&b=&se=true" -vp:"dui=091594cdfa6b72c8d4f606ef98dbf92357352f2a&dit=20221222203253429&oc=DOT_RAV_Cross_Tri_NCB&p=0535&oip=26&ptl=7&dta=true&a=100" -dp:"dui=091594cdfa6b72c8d4f606ef98dbf92357352f2a&dit=20221222203253429&oc=DOT_RAV_Cross_Tri_NCB&p=0535&a=100" -i -v -d
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                              PID:4988
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\qniunp22.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\qniunp22.exe" /silent
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                PID:632
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nsbFF16.tmp\RAVEndPointProtection-installer.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nsbFF16.tmp\RAVEndPointProtection-installer.exe" "C:\Users\Admin\AppData\Local\Temp\qniunp22.exe" /silent
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Drops file in Drivers directory
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                  PID:4964
                                                                                                                                                                                                                                                  • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
                                                                                                                                                                                                                                                    "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:10
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:1856
                                                                                                                                                                                                                                                  • \??\c:\windows\system32\rundll32.exe
                                                                                                                                                                                                                                                    "c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\ReasonCamFilter.inf
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                      PID:4600
                                                                                                                                                                                                                                                      • C:\Windows\system32\runonce.exe
                                                                                                                                                                                                                                                        "C:\Windows\system32\runonce.exe" -r
                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                          PID:3416
                                                                                                                                                                                                                                                          • C:\Windows\System32\grpconv.exe
                                                                                                                                                                                                                                                            "C:\Windows\System32\grpconv.exe" -o
                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                              PID:2632
                                                                                                                                                                                                                                                        • C:\Windows\SYSTEM32\fltmc.exe
                                                                                                                                                                                                                                                          "fltmc.exe" load ReasonCamFilter
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:3380
                                                                                                                                                                                                                                                          • \??\c:\windows\system32\rundll32.exe
                                                                                                                                                                                                                                                            "c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                            PID:3816
                                                                                                                                                                                                                                                            • C:\Windows\system32\runonce.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\runonce.exe" -r
                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                PID:3416
                                                                                                                                                                                                                                                                • C:\Windows\System32\grpconv.exe
                                                                                                                                                                                                                                                                  "C:\Windows\System32\grpconv.exe" -o
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:408
                                                                                                                                                                                                                                                            • C:\Windows\system32\wevtutil.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                PID:3880
                                                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\fltmc.exe
                                                                                                                                                                                                                                                                "fltmc.exe" load rsKernelEngine
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                                                                                                                                • Suspicious behavior: LoadsDriver
                                                                                                                                                                                                                                                                PID:2156
                                                                                                                                                                                                                                                              • C:\Windows\system32\wevtutil.exe
                                                                                                                                                                                                                                                                "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\elam\evntdrv.xml
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:1532
                                                                                                                                                                                                                                                              • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                                                                                                                                                                                                                                                                "C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Modifies system certificate store
                                                                                                                                                                                                                                                                PID:4512
                                                                                                                                                                                                                                                              • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                                                                                                                                                                                                                                                                "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe" -i
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                  PID:1336
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                      PID:3136
                                                                                                                                                                                                                                                                  • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                                                                                                                                                                                                                                                                    "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe" -i
                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                                                                                                    • Modifies system certificate store
                                                                                                                                                                                                                                                                    PID:3188
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\s13j03ps.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\s13j03ps.exe" /silent
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:3444
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsqBB71.tmp\RAVVPN-installer.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nsqBB71.tmp\RAVVPN-installer.exe" "C:\Users\Admin\AppData\Local\Temp\s13j03ps.exe" /silent
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                                                                                                    PID:2696
                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe
                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe" -i
                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                        PID:4192
                                                                                                                                                                                                                                                                      • C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe
                                                                                                                                                                                                                                                                        "C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe" -i
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                          PID:2084
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bdmnaer4.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bdmnaer4.exe" /silent
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:6204
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nse1DB5.tmp\SaferWeb-installer.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nse1DB5.tmp\SaferWeb-installer.exe" "C:\Users\Admin\AppData\Local\Temp\bdmnaer4.exe" /silent
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Drops file in Drivers directory
                                                                                                                                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                                                                                                                                          PID:6232
                                                                                                                                                                                                                                                                          • \??\c:\windows\system32\rundll32.exe
                                                                                                                                                                                                                                                                            "c:\windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\DNS\rsDwf.inf
                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                            PID:6464
                                                                                                                                                                                                                                                                            • C:\Windows\system32\runonce.exe
                                                                                                                                                                                                                                                                              "C:\Windows\system32\runonce.exe" -r
                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                                                                                              PID:6488
                                                                                                                                                                                                                                                                              • C:\Windows\System32\grpconv.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\grpconv.exe" -o
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:6528
                                                                                                                                                                                                                                                                            • C:\Program Files\ReasonLabs\DNS\rsDNSClientSvc.exe
                                                                                                                                                                                                                                                                              "C:\Program Files\ReasonLabs\DNS\rsDNSClientSvc.exe" -i
                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                PID:6740
                                                                                                                                                                                                                                                                              • C:\Program Files\ReasonLabs\DNS\rsDNSResolver.exe
                                                                                                                                                                                                                                                                                "C:\Program Files\ReasonLabs\DNS\rsDNSResolver.exe" -service install
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                  PID:6820
                                                                                                                                                                                                                                                                                • C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe" -i
                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                    PID:6984
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\saBSI.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\saBSI.exe" /affid 91088 PaidDistribution=true
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                              • Modifies system certificate store
                                                                                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                              PID:3424
                                                                                                                                                                                                                                                                              • C:\ProgramData\McAfee\WebAdvisor\saBSI\saBSI.exe
                                                                                                                                                                                                                                                                                "C:\ProgramData\McAfee\WebAdvisor\saBSI\saBSI.exe" /install /affid 91088 PaidDistribution=true saBsiVersion=4.1.1.663 /no_self_update
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                PID:4076
                                                                                                                                                                                                                                                                                • C:\ProgramData\McAfee\WebAdvisor\saBSI\installer.exe
                                                                                                                                                                                                                                                                                  "C:\ProgramData\McAfee\WebAdvisor\saBSI\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                    PID:3812
                                                                                                                                                                                                                                                                                    • C:\Program Files\McAfee\Temp4017429438\installer.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files\McAfee\Temp4017429438\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade
                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                        PID:2156
                                                                                                                                                                                                                                                                                        • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                                                                                                          sc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"
                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                                          PID:4624
                                                                                                                                                                                                                                                                                        • C:\Windows\SYSTEM32\regsvr32.exe
                                                                                                                                                                                                                                                                                          regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                                                                                                                                                              /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                PID:3868
                                                                                                                                                                                                                                                                                            • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                                                                                                              sc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"
                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                                              PID:2056
                                                                                                                                                                                                                                                                                            • C:\Windows\SYSTEM32\regsvr32.exe
                                                                                                                                                                                                                                                                                              regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"
                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                PID:3172
                                                                                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                                                                                                                sc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//0
                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                                                                PID:2792
                                                                                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                                                                                                                                                                sc.exe start "McAfee WebAdvisor"
                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                • Registers COM server for autorun
                                                                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                                                                PID:1604
                                                                                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\regsvr32.exe
                                                                                                                                                                                                                                                                                                regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"
                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                • Registers COM server for autorun
                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                PID:2168
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                                                                                                                                                                  /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"
                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                    PID:528
                                                                                                                                                                                                                                                                                                • C:\Windows\SYSTEM32\regsvr32.exe
                                                                                                                                                                                                                                                                                                  regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"
                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                    PID:4720
                                                                                                                                                                                                                                                                                          • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:10
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                            PID:2812
                                                                                                                                                                                                                                                                                          • C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                            PID:980
                                                                                                                                                                                                                                                                                            • C:\Program Files\McAfee\WebAdvisor\UIHost.exe
                                                                                                                                                                                                                                                                                              "C:\Program Files\McAfee\WebAdvisor\UIHost.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                                                              PID:2324
                                                                                                                                                                                                                                                                                            • C:\Program Files\McAfee\WebAdvisor\updater.exe
                                                                                                                                                                                                                                                                                              "C:\Program Files\McAfee\WebAdvisor\updater.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                                                                                                                                                                              PID:3812
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:4488
                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                      PID:3216
                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                        PID:2752
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:4912
                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                    PID:2468
                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:1212
                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                      PID:4088
                                                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                                                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\EPP\rsWSC.exe"
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                      PID:4676
                                                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                                                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:2872
                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:4292
                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:1280
                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:4436
                                                                                                                                                                                                                                                                                                            • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                                                                                                                                                                                                                                                                                                              "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                              PID:1420
                                                                                                                                                                                                                                                                                                              • \??\c:\program files\reasonlabs\epp\rsHelper.exe
                                                                                                                                                                                                                                                                                                                "c:\program files\reasonlabs\epp\rsHelper.exe"
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:1656
                                                                                                                                                                                                                                                                                                                • \??\c:\program files\reasonlabs\EPP\ui\EPP.exe
                                                                                                                                                                                                                                                                                                                  "c:\program files\reasonlabs\EPP\ui\EPP.exe" --minimized --first-run
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:4380
                                                                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" "c:\program files\reasonlabs\EPP\ui\app.asar" --engine-path="c:\program files\reasonlabs\EPP" --minimized --first-run
                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                      PID:1996
                                                                                                                                                                                                                                                                                                                      • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                        "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\RAV Endpoint Protection" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 --field-trial-handle=2608,i,17140205233695199343,9123462059592859454,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                          PID:5352
                                                                                                                                                                                                                                                                                                                        • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                          "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\RAV Endpoint Protection" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2328 --field-trial-handle=2608,i,17140205233695199343,9123462059592859454,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                            PID:5380
                                                                                                                                                                                                                                                                                                                          • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                            "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RAV Endpoint Protection" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2496 --field-trial-handle=2608,i,17140205233695199343,9123462059592859454,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                                                                                            PID:5400
                                                                                                                                                                                                                                                                                                                          • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                            "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RAV Endpoint Protection" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3508 --field-trial-handle=2608,i,17140205233695199343,9123462059592859454,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                                                                                            PID:5908
                                                                                                                                                                                                                                                                                                                      • C:\program files\reasonlabs\epp\rsLitmus.A.exe
                                                                                                                                                                                                                                                                                                                        "C:\program files\reasonlabs\epp\rsLitmus.A.exe"
                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                          PID:5996
                                                                                                                                                                                                                                                                                                                      • C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe
                                                                                                                                                                                                                                                                                                                        "C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe"
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:2128
                                                                                                                                                                                                                                                                                                                        • C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe
                                                                                                                                                                                                                                                                                                                          "C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                                          PID:5688
                                                                                                                                                                                                                                                                                                                          • \??\c:\program files\reasonlabs\VPN\ui\VPN.exe
                                                                                                                                                                                                                                                                                                                            "c:\program files\reasonlabs\VPN\ui\VPN.exe" --minimized --focused --first-run
                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                              PID:5156
                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:5736
                                                                                                                                                                                                                                                                                                                            • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                              "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" "c:\program files\reasonlabs\VPN\ui\app.asar" --engine-path="c:\program files\reasonlabs\VPN" --minimized --focused --first-run
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                              PID:5232
                                                                                                                                                                                                                                                                                                                              • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 --field-trial-handle=2252,i,8972709222781924681,6061637274694989558,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                  PID:4540
                                                                                                                                                                                                                                                                                                                                • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --app-user-model-id=com.reasonlabs.vpn --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2748 --field-trial-handle=2252,i,8972709222781924681,6061637274694989558,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                  PID:5988
                                                                                                                                                                                                                                                                                                                                • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --mojo-platform-channel-handle=2564 --field-trial-handle=2252,i,8972709222781924681,6061637274694989558,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                    PID:5604
                                                                                                                                                                                                                                                                                                                                  • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --app-user-model-id=com.reasonlabs.vpn --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3924 --field-trial-handle=2252,i,8972709222781924681,6061637274694989558,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                    PID:6028
                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:4644
                                                                                                                                                                                                                                                                                                                                  • C:\Program Files\ReasonLabs\DNS\rsDNSClientSvc.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Program Files\ReasonLabs\DNS\rsDNSClientSvc.exe"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:6780
                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\DNS\rsDNSResolver.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\DNS\rsDNSResolver.exe"
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:6888
                                                                                                                                                                                                                                                                                                                                      • C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe"
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:7144
                                                                                                                                                                                                                                                                                                                                          • \??\c:\program files\reasonlabs\DNS\ui\DNS.exe
                                                                                                                                                                                                                                                                                                                                            "c:\program files\reasonlabs\DNS\ui\DNS.exe" --minimized --focused --first-run
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                              PID:3444
                                                                                                                                                                                                                                                                                                                                              • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" "c:\program files\reasonlabs\DNS\ui\app.asar" --engine-path="c:\program files\reasonlabs\DNS" --minimized --focused --first-run
                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                  PID:3676
                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\DNS" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 --field-trial-handle=2232,i,10918299349354658756,15160670023106344956,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                                      PID:6468
                                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\DNS" --app-user-model-id=com.reasonlabs.dns --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2768 --field-trial-handle=2232,i,10918299349354658756,15160670023106344956,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                        PID:6604
                                                                                                                                                                                                                                                                                                                                                      • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\DNS" --mojo-platform-channel-handle=2524 --field-trial-handle=2232,i,10918299349354658756,15160670023106344956,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                          PID:6400
                                                                                                                                                                                                                                                                                                                                                        • C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Program Files\ReasonLabs\Common\Client\v1.0.7\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\DNS" --app-user-model-id=com.reasonlabs.dns --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.0.7\resources\app.asar" --enable-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=2232,i,10918299349354658756,15160670023106344956,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                                                            PID:3164
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:6436

                                                                                                                                                                                                                                                                                                                                                      Network

                                                                                                                                                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\rsStubActivator.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        44KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        54d8270933e0876acb42b718eb955b2e

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        dab6d113fc5b9593807f9ae9f12c693d12697c8f

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        8dac618a7b8638c13080085fb2b6ef94af42b7e41c10ef59436305d3cf4478fb

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        ab8a02c8c8746acf95c3b453bc732faf788eeac13e489f85eb4707f21fce8e8019948e707a6498c152b7109a0e1b3d67173eaefac7c01f561b97ee3b66ff03a7

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\saBSI.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        1.2MB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MPCP_FS_files\saBSI.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        1.2MB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\InstallOptions.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        14KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        2a03c4a7ac5ee5e0e0a683949f70971b

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        3bd9877caaea4804c0400420494ad1143179dcec

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\InstallOptions.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        14KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        2a03c4a7ac5ee5e0e0a683949f70971b

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        3bd9877caaea4804c0400420494ad1143179dcec

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\System.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        6f5257c0b8c0ef4d440f4f4fce85fb1b

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        b6ac111dfb0d1fc75ad09c56bde7830232395785

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\UserInfo.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        8ef0e4eb7c89cdd2b552de746f5e2a53

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        820f681e7cec409a02b194a487d1c8af1038acf0

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        41293b9f6588e0fbdc8fcf2a9bd8e2b244cd5ff038fc13033378da337219c9dc

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        a68533e8a19637d0d44219549b24baba0dc4824424842f125600fda3edcafc4bb6bb340d57a00815f262d82373b440d58d6e4e5b2ceb29bb3f6bc4cbde66c3c5

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\UserInfo.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        8ef0e4eb7c89cdd2b552de746f5e2a53

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        820f681e7cec409a02b194a487d1c8af1038acf0

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        41293b9f6588e0fbdc8fcf2a9bd8e2b244cd5ff038fc13033378da337219c9dc

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        a68533e8a19637d0d44219549b24baba0dc4824424842f125600fda3edcafc4bb6bb340d57a00815f262d82373b440d58d6e4e5b2ceb29bb3f6bc4cbde66c3c5

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\UserInfo.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        8ef0e4eb7c89cdd2b552de746f5e2a53

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        820f681e7cec409a02b194a487d1c8af1038acf0

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        41293b9f6588e0fbdc8fcf2a9bd8e2b244cd5ff038fc13033378da337219c9dc

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        a68533e8a19637d0d44219549b24baba0dc4824424842f125600fda3edcafc4bb6bb340d57a00815f262d82373b440d58d6e4e5b2ceb29bb3f6bc4cbde66c3c5

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsDialogs.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        9KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        d9256d9acaecabb20b7e9a1595abfa36

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        ece1cab181dac7729246da1d4494b8daa10c3b70

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d7b2c55977a541f8d075e48d4e0a82eec79ad247b0ed168c19a8518131acd19c

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        5827cdbfde0e766d1b74ecb22f9614232031da41c21d0f6ff6c9d5dcdfc0adc23e8fd616eb020ab42208932444b5e0cb1e6d6e698bead412eae19624a180b6ff

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsDialogs.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        9KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        d9256d9acaecabb20b7e9a1595abfa36

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        ece1cab181dac7729246da1d4494b8daa10c3b70

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d7b2c55977a541f8d075e48d4e0a82eec79ad247b0ed168c19a8518131acd19c

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        5827cdbfde0e766d1b74ecb22f9614232031da41c21d0f6ff6c9d5dcdfc0adc23e8fd616eb020ab42208932444b5e0cb1e6d6e698bead412eae19624a180b6ff

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsExec.dll

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        c129bc26a26be6f5816a03520bb37833

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        18100042155f948301701744b131c516bf26ddb8

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        d3694fa0503158194129d113fcc1c83177ff5a5f93d898ce0bcfe9ce12f06bf4

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        dbe79859c41e00a6e951cee889e7f0de29a712792fb531662285a2d6e384884518c7d5d983894c185b3d31d81213d2477cf4576b0114d352b759fe07a1704e63

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsmA62B.tmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        30KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1bc3c1608ac94cf3fb4575dc96610fe0

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        02a953629b0e272d8a9bbf5dacbb03402853bc8a

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        64f426601f824c9ec361755cb157d5f80499b8bbf4a29455bfca1fb65f2aae5c

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        63881bcdf359f22de1a7582d943ec241ab2fe32fd68e202befd940c4e2ee86092797bc2de4514685d122235465fcc992cb0b5c1b9899869f9ca5840bcd8bec05

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsmA62B.tmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        30KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1bc3c1608ac94cf3fb4575dc96610fe0

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        02a953629b0e272d8a9bbf5dacbb03402853bc8a

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        64f426601f824c9ec361755cb157d5f80499b8bbf4a29455bfca1fb65f2aae5c

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        63881bcdf359f22de1a7582d943ec241ab2fe32fd68e202befd940c4e2ee86092797bc2de4514685d122235465fcc992cb0b5c1b9899869f9ca5840bcd8bec05

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsg8C0A.tmp\nsmA62B.tmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        30KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1bc3c1608ac94cf3fb4575dc96610fe0

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        02a953629b0e272d8a9bbf5dacbb03402853bc8a

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        64f426601f824c9ec361755cb157d5f80499b8bbf4a29455bfca1fb65f2aae5c

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        63881bcdf359f22de1a7582d943ec241ab2fe32fd68e202befd940c4e2ee86092797bc2de4514685d122235465fcc992cb0b5c1b9899869f9ca5840bcd8bec05

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qniunp22.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        964d771de1bf8f406d9bf08791059971

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        33c818324fc9c5328d70e3c3adb75a86e5c1ed72

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        20ca1513c2fc508c1f35a929e77ed257f355db087ffcb8ef0ec0565cc18d1c11

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        3f2b72a3e6192ef46666b04e78d51bf4b340c2a272aef96448c239e09ae905e96949ae2c7b427579112718c4c076e24c2bba0e09637870c5aa41fe458a6265a4

                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qniunp22.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        964d771de1bf8f406d9bf08791059971

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        33c818324fc9c5328d70e3c3adb75a86e5c1ed72

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        20ca1513c2fc508c1f35a929e77ed257f355db087ffcb8ef0ec0565cc18d1c11

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        3f2b72a3e6192ef46666b04e78d51bf4b340c2a272aef96448c239e09ae905e96949ae2c7b427579112718c4c076e24c2bba0e09637870c5aa41fe458a6265a4

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Codecs\SetACL.exe

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        556KB

                                                                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                                                                        1d2af4d7b2a745f0b28498d0db49eb8a

                                                                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                                                                        d353180a668d53185aec0012a832e80a04e6a2e7

                                                                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                                                                        139cdf232bf6b710079f65b52a2ba9d5f5f33b6799fbdf441677902e757e76b5

                                                                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                                                                        99428e594d212166a73007c6441c5aae1c5aace5487a1d06db7511adb1eb82b76e7be360804a5147a4df838839abb1de0944eb46bb30a90dbacc14d772312813

                                                                                                                                                                                                                                                                                                                                                      • memory/388-227-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/528-399-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/548-279-0x0000000002940000-0x0000000002959000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        100KB

                                                                                                                                                                                                                                                                                                                                                      • memory/548-274-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/632-205-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/672-161-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/724-232-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/800-372-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/904-282-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1240-284-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1240-398-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-445-0x000001B8786A0000-0x000001B8786C8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        160KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-430-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-435-0x000001B877F50000-0x000001B877F86000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        216KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-436-0x000001B8784A0000-0x000001B8784CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        184KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-437-0x000001B878530000-0x000001B87858E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        376KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-438-0x000001B878F00000-0x000001B879186000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        2.5MB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-440-0x000001B878600000-0x000001B878666000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        408KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-432-0x000001B877E50000-0x000001B877E84000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        208KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-442-0x000001B878590000-0x000001B8785CA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        232KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-443-0x000001B878670000-0x000001B878696000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        152KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-433-0x000001B877E90000-0x000001B877EC2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        200KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-431-0x000001B877CD0000-0x000001B877CF4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        144KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1420-434-0x000001B877ED0000-0x000001B877F08000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        224KB

                                                                                                                                                                                                                                                                                                                                                      • memory/1552-231-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1604-272-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1604-397-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1856-233-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/1860-228-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2056-340-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2140-341-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2140-286-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-308-0x00007FF70ED90000-0x00007FF70EDA0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-312-0x00007FF76E920000-0x00007FF76E930000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-326-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-328-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-332-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-329-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-334-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-335-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-336-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-320-0x00007FF76E920000-0x00007FF76E930000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-338-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-330-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-331-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-327-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-321-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-316-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-317-0x00007FF76E920000-0x00007FF76E930000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-319-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-343-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-322-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-346-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-347-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-348-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-351-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-350-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-349-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-323-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-344-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-318-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-325-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-307-0x00007FF773360000-0x00007FF773370000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-324-0x00007FF76E920000-0x00007FF76E930000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-304-0x00007FF771F20000-0x00007FF771F30000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-305-0x00007FF771F20000-0x00007FF771F30000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-303-0x00007FF771F20000-0x00007FF771F30000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-302-0x00007FF771F20000-0x00007FF771F30000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-306-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-313-0x00007FF75B860000-0x00007FF75B870000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-314-0x00007FF70ED90000-0x00007FF70EDA0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-311-0x00007FF7275A0000-0x00007FF7275B0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-298-0x00007FF771F20000-0x00007FF771F30000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-295-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2156-310-0x00007FF769130000-0x00007FF769140000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2168-278-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2168-280-0x0000000000C10000-0x0000000000C29000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        100KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2168-395-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2188-281-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2204-181-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2376-293-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/2376-409-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/2376-289-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2376-292-0x0000020EE4BA0000-0x0000020EE4BB0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2460-220-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2472-309-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2576-299-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2576-236-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2592-191-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2696-444-0x000002B91E390000-0x000002B91E3C8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        224KB

                                                                                                                                                                                                                                                                                                                                                      • memory/2756-275-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2792-357-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/2848-297-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3172-339-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-426-0x0000026E58630000-0x0000026E5868A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        360KB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-427-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-429-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-211-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-423-0x0000026E58630000-0x0000026E5868A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        360KB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-424-0x0000026E736A0000-0x0000026E736F4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        336KB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-428-0x0000026E73DB0000-0x0000026E73FDC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        2.2MB

                                                                                                                                                                                                                                                                                                                                                      • memory/3188-425-0x0000026E58A30000-0x0000026E58A56000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        152KB

                                                                                                                                                                                                                                                                                                                                                      • memory/3268-224-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3444-294-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3540-296-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3812-290-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3868-333-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3880-277-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/3996-216-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4076-235-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4180-359-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4200-288-0x0000000000600000-0x0000000000612000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        72KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4200-287-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4204-222-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4228-271-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4228-197-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4292-229-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4304-173-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4392-402-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4476-403-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4504-154-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-414-0x000001CC5A3C0000-0x000001CC5A3D2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        72KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-417-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-416-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-412-0x000001CC5A010000-0x000001CC5A03E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        184KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-413-0x000001CC5A010000-0x000001CC5A03E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        184KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4512-415-0x000001CC750B0000-0x000001CC750EC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        240KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4624-315-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4632-301-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4656-217-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4660-273-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4660-276-0x0000000000560000-0x0000000000579000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        100KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4664-401-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-419-0x0000013F78740000-0x0000013F78AA6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        3.4MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-418-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-420-0x0000013F78AB0000-0x0000013F78C2C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-421-0x0000013F77A50000-0x0000013F77A6A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        104KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-422-0x0000013F77AA0000-0x0000013F77AC2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        136KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4676-441-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4688-389-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4720-400-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4720-285-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4756-167-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-234-0x0000000004D40000-0x0000000004D43000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        12KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-238-0x0000000004D91000-0x0000000004D9D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        48KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-241-0x0000000004D91000-0x0000000004D98000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        28KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-250-0x0000000004DB0000-0x0000000004DD0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        128KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-244-0x0000000004D91000-0x0000000004D97000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        24KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-137-0x0000000074A90000-0x0000000074AA0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-138-0x0000000007510000-0x0000000007AB4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        5.6MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-139-0x0000000007B20000-0x0000000007BB2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        584KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-253-0x0000000004F10000-0x0000000004F39000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        164KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-255-0x000000000B350000-0x000000000B367000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        92KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-262-0x0000000004F10000-0x0000000004F39000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        164KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-269-0x000000000B760000-0x000000000B809000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        676KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-270-0x000000000B760000-0x000000000B809000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        676KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-300-0x0000000004DB0000-0x0000000004DB3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        12KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-342-0x000000000B760000-0x000000000B809000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        676KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-345-0x000000000B760000-0x000000000B809000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        676KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-140-0x0000000008830000-0x00000000088CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        624KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-141-0x00000000088D0000-0x0000000008936000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        408KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-242-0x000000000B760000-0x000000000B834000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        848KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-239-0x0000000004D91000-0x0000000004D9C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        44KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-240-0x0000000004D90000-0x0000000004DA5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        84KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-142-0x0000000008990000-0x0000000008EBC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        5.2MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-237-0x0000000004D91000-0x0000000004D9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        40KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4900-147-0x00000000096C0000-0x00000000096CA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        40KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4908-337-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4916-203-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-223-0x000001801D450000-0x000001801D47E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        184KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-225-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-219-0x000001801CF30000-0x000001801CFB2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        520KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-218-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-291-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-226-0x000001801ED60000-0x000001801ED98000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        224KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-410-0x00000180388A0000-0x0000018038916000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        472KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-230-0x000001801EDA0000-0x000001801EDCE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        184KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-439-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-221-0x000001801D490000-0x000001801D4C4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        208KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4964-411-0x0000018038820000-0x000001803883E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        120KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4988-182-0x0000020662B70000-0x0000020663098000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        5.2MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4988-176-0x00000206473A0000-0x00000206473A8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        32KB

                                                                                                                                                                                                                                                                                                                                                      • memory/4988-283-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                                                                      • memory/4988-184-0x00007FFBDBA50000-0x00007FFBDC511000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                                                                        10.8MB